• Title/Summary/Keyword: Software Vulnerability

Search Result 243, Processing Time 0.025 seconds

Seismic Retrofit Assessment of Different Bracing Systems

  • Sudipta Chakraborty;Md. Rajibul Islam;Dookie Kim;Jeong Young Lee
    • Architectural research
    • /
    • v.25 no.1
    • /
    • pp.1-9
    • /
    • 2023
  • Structural ageing influences the structural performance in a negative way by reducing the seismic resilience of the structure which makes it a major concern around the world. Retrofitting is considered to be a pragmatic and feasible solution to address this issue. Numerous retrofitting techniques are devised by researchers over the years. The viability of using steel bracings as retrofitting component is evaluated on a G+30 storied building model designed according to ACI318-14 and ASCE 7-16. Four different types of steel bracing arrangements (V, Inverted V/ Chevron, Cross/ X, Diagonal) are assessed in the model developed in commercial nu-merical analysis software while considering both material and geometric nonlinearities. Reducing displacement and cost in the structures indicates that the design is safe and economical. Therefore, the purpose of this article is to find the best bracing system that causes minimum displacement, which indicates maximum lateral stiffness. To evaluate the seismic vulnerability of each system, incremental dynamic analysis was conducted to develop fragility curves, followed by the formation of collapse margin ratio (CMR) as stipulated in FEMA P695 and finally, a cost estimation was made for each system. The outcomes revealed that the effects of ge-ometric nonlinearity tend to evoke hazardous consequences if not considered in the structural design. Probabilistic seismic and economic probes indicated the superior performance of V braced frame system and its competency to be a germane technique for retrofitting.

Cortical thickness of the rostral anterior cingulate gyrus is associated with frailty in patients with end-stage renal disease undergoing hemodialysis in Korea: a cross-sectional study

  • Sang Hyun Jung;Jong Soo Oh;So-Young Lee;Hye Yun Jeong
    • Journal of Yeungnam Medical Science
    • /
    • v.40 no.4
    • /
    • pp.381-387
    • /
    • 2023
  • Background: Frailty is defined as a condition of being weak and delicate, and it represents a state of high vulnerability to adverse health outcomes. Recent studies have suggested that the cingulate gyrus is associated with frailty in the elderly population. However, few imaging studies have explored the relationship between frailty and the cingulate gyrus in patients with end-stage renal disease (ESRD) undergoing hemodialysis. Methods: Eighteen right-handed patients with ESRD undergoing hemodialysis were enrolled in the study. We used the FreeSurfer software package to estimate the cortical thickness of the regions of interest, including the rostral anterior, caudal anterior, isthmus, and posterior cingulate gyri. The Beck Depression Inventory, Beck Anxiety Inventory, and laboratory tests were also conducted. Results: The cortical thickness of the right rostral anterior cingulate gyrus (ACG) was significantly correlated with the Fried frailty index, age, and creatinine level. Multiple regression analysis indicated that the cortical thickness of the right rostral ACG was associated with frailty after controlling for age and creatinine level. Conclusion: Our results indicate that the cortical thickness of the rostral ACG may be associated with frailty in patients with ESRD on hemodialysis and that the rostral ACG may play a role in the frailty mechanism of this population.

A Study on the Improvement of Security Enhancement for ZTNA (보안성 강화를 위한 ZTNA운영 개선방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.21-26
    • /
    • 2024
  • The security model in the previous network environment has a vulnerability in which resource access control for trusted users is not properly achieved using the Perimeter model based on trust. The Zero Trust is an absolute principle to assume that the users and devices accessing internal data have nothing to trust. Applying the Zero Trust principle is very successful in reducing the attack surface of an organization, and by using the Zero Trust, it is possible to minimize damage when an attack occurs by limiting the intrusion to one small area through segmentation. ZTNA is a major technology that enables organizations to implement Zero Trust security, and similar to Software Defined Boundary (SDP), ZTNA hides most of its infrastructure and services, establishing one-to-one encrypted connections between devices and the resources they need. In this study, we review the functions and requirements that become the principles of the ZTNA architecture, and also study the security requirements and additional considerations according to the construction and operation of the ZTNA solution.

Estimating the rating curve of irrigation canals in the Cheongju Sindae area

  • Mikyoung Choi;Inhyeok Song;Heesung Lim;Hansol Kang;Hyunuk An
    • Korean Journal of Agricultural Science
    • /
    • v.51 no.1
    • /
    • pp.79-86
    • /
    • 2024
  • As the frequency and intensity of heavy rains increase, the vulnerability of agriculture to disasters also increases. Consequently, there is a need to improve flood and inundation predictions. To enhance the accuracy of inundation predictions, it is essential to monitor water level and discharge data within agricultural areas. This study was conducted to monitor water levels and rainfall in the Cheongju Sindae area from 2022 to 2023, and the data was utilized as input and validation data for agricultural inundation modeling. Four irrigation drainage canals were installed to a square-shaped concrete structure where the water level gauge is. It was then confirmed that the water level rises with rainfall. The flow velocities were monitored during periods of heavy rainfall. The rating curve, which estimates water level and flow velocity based on observations, was estimated using the software K-HQ. The resulting curve was presented with the Coefficient of Determination (R2). K-HQ was also used to calculate the equation for the rating curve, taking outliers into account at each data point. Outliers were extracted and the rating curve was recalculated. As the coefficient of determination of three out of four stations exceeded 0.95, the estimated rating curve may be considered reliable for discharge estimation. This study provides critical data for enhancing agricultural inundation modeling accuracy and drainage improvement projects.

An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit (심볼릭 링크 공격 취약성 검출을 위한 분석 기법)

  • Joo, Seong-Yong;Ahn, Joon-Seon;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.45-52
    • /
    • 2008
  • In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.

An Interpretable Log Anomaly System Using Bayesian Probability and Closed Sequence Pattern Mining (베이지안 확률 및 폐쇄 순차패턴 마이닝 방식을 이용한 설명가능한 로그 이상탐지 시스템)

  • Yun, Jiyoung;Shin, Gun-Yoon;Kim, Dong-Wook;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.77-87
    • /
    • 2021
  • With the development of the Internet and personal computers, various and complex attacks begin to emerge. As the attacks become more complex, signature-based detection become difficult. It leads to the research on behavior-based log anomaly detection. Recent work utilizes deep learning to learn the order and it shows good performance. Despite its good performance, it does not provide any explanation for prediction. The lack of explanation can occur difficulty of finding contamination of data or the vulnerability of the model itself. As a result, the users lose their reliability of the model. To address this problem, this work proposes an explainable log anomaly detection system. In this study, log parsing is the first to proceed. Afterward, sequential rules are extracted by Bayesian posterior probability. As a result, the "If condition then results, post-probability" type rule set is extracted. If the sample is matched to the ruleset, it is normal, otherwise, it is an anomaly. We utilize HDFS datasets for the experiment, resulting in F1score 92.7% in test dataset.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

Chemical Disaster of Methyl Isocyanate Leakage (화학물질 누출에 의한 대량재해 - Methyl Isocyanate 누출을 중심으로 -)

  • Yang, Hyuk-Jun;Choi, Jung-Myung;Yoo, Dong-Jun
    • The Korean Journal of Emergency Medical Services
    • /
    • v.3 no.1
    • /
    • pp.7-19
    • /
    • 1999
  • Background : We are in the edge of some human made disasters such as hazardous materials and air pollution, for example, the world news reported that the city of Bhopal, India had serious victims related with a leaking out of the chemical materials, Methyl Isocyanate and many people in India were killed by. These situations many people who live in this world are world are worrying about are not others, but just ours and people consider about that kind of the disasters are the possible situation to happen to all the people. Therefore, we performed this basic study to recognize the risk of Methyl Isocyanate leak accident and to prepare local disaster plan with EMS system. Method : Trace 8.0, a simulation software made by the U.S. company Safer System was used as a tool to estimate the diffusion distance, area and its victims at the concentrations of 0.02ppm, 0.2ppm 5ppm respectively for an assumed B-city of 2 hundred thousands population count in which was presumed 500kg Methyl Isocyanate gas to leak out. Results : 1. During 1 hour, maximum diffusion distances of 0.02ppm 0.2ppm and 5ppm were 5.41km, 1.61km and 0.29km respectively on the plume impact. 2. Maximum population counts influenced by Methyl Isocyanate gas at the concentrations of 0.02ppm 0.2ppm and 5ppm were 40838, 4346 and 222 on the plume impact, while those were 138238, 17261 and 1588 on the vulnerability impact, respectively. 3. Therefore, 17261 persons must put on respiratory device and 138283 persons must be evacuated to safety place within 1 hour. Conclusions : Only small amount leak of Methyl Isocyanate may cause tremendous chemical disaster in urban area, so its disaster plan must be prepared with an accident simulation program and Material Safety Data Sheets(MSDS). Especially, nearby emergency center of an industrial complex must have a strong position about preparation of chemical disaster plan and perform a disaster dill of hazardous material accident annually.

  • PDF

Vulnerability Analysis for Industrial Control System Cyber Security (산업제어시스템의 사이버보안을 위한 취약점 분석)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.1
    • /
    • pp.137-142
    • /
    • 2014
  • Industrial control system (ICS) is a computer based system which are typically used in nation-wide critical infra-structure facilities such as electrical, gas, water, wastewater, oil and transportation. In addition, ICS is essentially used in industrial application domain to effectively monitor and control the remotely scattered systems. The highly developed information technology (IT) and related network techniques are continually adapted into domains of industrial control system. However, industrial control system is confronted significant side-effects, which ICS is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in industrial control system. The vulnerabilities that may be found in typical ICS are grouped into Policy and Procedure, Platform, and Network categories to assist in determining optimal mitigation strategies. The order of these vulnerabilities does not necessarily reflect any priority in terms of likelihood of occurrence or severity of impact. Firstly, corporate security policy can reduce vulnerabilities by mandating conduct such as password usage and maintenance or requirements for connecting modems to ICS. Secondly, platfom vulnerabilities can be mitigated through various security controls, such as OS and application patching, physical access control, and security software. Thirdly, network vulnerabilities can be eliminated or mitigated through various security controls, such as defense-in-depth network design, encrypting network communication, restricting network traffic flows, and providing physical access control for network components.

Development of Extreme Event Analysis Tool Base on Spatial Information Using Climate Change Scenarios (기후변화 시나리오를 활용한 공간정보 기반 극단적 기후사상 분석 도구(EEAT) 개발)

  • Han, Kuk-Jin;Lee, Moung-Jin
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.3
    • /
    • pp.475-486
    • /
    • 2020
  • Climate change scenarios are the basis of research to cope with climate change, and consist of large-scale spatio-temporal data. From the data point of view, one scenario has a large capacity of about 83 gigabytes or more, and the data format is semi-structured, making it difficult to utilize the data through means such as search, extraction, archiving and analysis. In this study, a tool for analyzing extreme climate events based on spatial information is developed to improve the usability of large-scale, multi-period climate change scenarios. In addition, a pilot analysis is conducted on the time and space in which the heavy rain thresholds that occurred in the past can occur in the future, by applying the developed tool to the RCP8.5 climate change scenario. As a result, the days with a cumulative rainfall of more than 587.6 mm over three days would account for about 76 days in the 2080s, and localized heavy rains would occur. The developed analysis tool was designed to facilitate the entire process from the initial setting through to deriving analysis results on a single platform, and enabled the results of the analysis to be implemented in various formats without using specific commercial software: web document format (HTML), image (PNG), climate change scenario (ESR), statistics (XLS). Therefore, the utilization of this analysis tool is considered to be useful for determining future prospects for climate change or vulnerability assessment, etc., and it is expected to be used to develop an analysis tool for climate change scenarios based on climate change reports to be presented in the future.