• Title/Summary/Keyword: Vulnerability Analysis

Search Result 1,308, Processing Time 0.023 seconds

mVoIP Vulnerability Analysis And its Countermeasures on Smart Phone (스마트폰에서 mVoIP 취약성 분석 및 대응 방안)

  • Cho, Sik-Wan;Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.3
    • /
    • pp.7-12
    • /
    • 2012
  • mVoIP (mobile Voice over Internet Protocol) service is a technology to transmit voice data through an IP network using mobile device. mVoIP provides various supplementary services with low communication cost. It can maximize the availability and efficiency by using IP-based network resources. In addition, the users can use voice call service at any time and in any place, as long as they can access the Internet on mobile device easily. However, SIP on mobile device is exposed to IP-based attacks and threats. Observed cyber threats to SIP services include wiretapping, denial of service, and service misuse, VoIP spam which are also applicable to existing IP-based networks. These attacks are also applicable to SIP and continuously cause problems. In this study, we analysis the threat and vulnerability on mVoIP service and propose several possible attack scenarios on existing mobile VoIP devices. Based on a proposed analysis and vulnerability test mechanism, we can construct more enhanced SIP security mechanism and stable mobile VoIP service framework after eliminating its vulnerability on mobile telephony system.

Social Vulnerability Assessment by Resident's Conflict Analysis on Rural Development Project of Region Unit (권역단위사업에서 주민 갈등 분석에 의한 사회적 취약성 평가)

  • Rhee, Shin Ho;Min, Heung Gi;Yoon, Sung Soo;Jung, Nam Su;Chang, Woo Seok
    • Journal of Korean Society of Rural Planning
    • /
    • v.21 no.1
    • /
    • pp.77-87
    • /
    • 2015
  • In this study, we try to quantify resident's conflict by rural development project based on previous researches about community capacities required for residents and social networks in rural village for suggesting efficient project model. we analyzed conflict elements in six category such as 'conflict in residents', 'conflict in residents and leaders', 'conflict in leaders', 'conflict in villages', 'conflict in development fund', 'conflict in village by common income project'. These results also analyzed by personal background(age, role, education, income) of respondent in questionary survey. Results show that 'conflict in residents and leaders', 'conflict in leaders', 'conflict in development fund' are perceived differently by age, role, education, and income in 5% significance level. Especially, relatively young age(below 40 years old) expressed clearly about conflict and high scored in item of 'residents and leaders'. Regression model show statistical significance(F=39.807, P=0.000) in influence relation analysis of conflict, network, leadership, and project fund. In this model, network ${\beta}=-0.237$, leadership ${\beta}=-0.375$, project fund ${\beta}=-0.000$ show network and leadership have negative relation to conflict but project fund is difficult to find relation with conflict. In this study, we defined social vulnerability using conflict, network, and leadership and verified the vulnerability of rural village applying regional community capacity in analysis results; vulnerability increased by the size of region and show inverse correlation to future vision of residents.

Deep Learning-Based Automation Cyber Attack Convergence Trend Analysis Mechanism for Deep Learning-Based Security Vulnerability Analysis (사이버공격 융합 동향 분석을 위한 딥러닝 기반 보안 취약점 분석 자동화 메커니즘)

  • Kim, Jinsu;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.99-107
    • /
    • 2022
  • In the current technological society, where various technologies are converged into one and being transformed into new technologies, new cyber attacks are being made just as they keep pace with the changes in society. In particular, due to the convergence of various attacks into one, it is difficult to protect the system with only the existing security system. A lot of information is being generated to respond to such cyber attacks. However, recklessly generated vulnerability information can induce confusion by providing unnecessary information to administrators. Therefore, this paper proposes a mechanism to assist in the analysis of emerging cyberattack convergence technologies by providing differentiated vulnerability information to managers by learning documents using deep learning-based language learning models, extracting vulnerability information and classifying them according to the MITRE ATT&CK framework.

Comparative Analysis on Methods for Evaluating Vulnerability of Debris Flow Hazard (토석류 재해 위험성 평가 방법의 비교 분석)

  • Joe, Jeong-Ha;Hwang, Hui-Seok;Yoo, Nam-Jae
    • Journal of Industrial Technology
    • /
    • v.36
    • /
    • pp.49-55
    • /
    • 2016
  • Different criteria for evaluating vulnerability of debris flow hazard proposed by various institutes such as Korea Forest Service(KFS), Korea Institute of Geoscience and Mineral Resources(KIGAM), Ministry of Public Safety and Security (MPSS) and Korea Expressway Corporation (KEC) were reviewed and discussed. Assessment of debris flow hazard for natural slopes around land for house development was carried out on the basis of the report about results of performing in-situ survey. Results of evaluating vulnerability of debris flow hazard by using these methods were compared to each other to discuss appropriateness of their evaluation and to recommend improvement.

  • PDF

A Study on the Factors Affecting Continuous Intention and Expansion of Communication Channels in Social Network Service (소셜네트워크서비스에서 지속사용의도 및 관계채널확장에 영향을 미치는 요인에 관한 연구)

  • Park, Seon-Hwa;Gim, Gwang-Yong
    • Journal of Information Technology Services
    • /
    • v.11 no.2
    • /
    • pp.319-337
    • /
    • 2012
  • To stress the importance of privacy in social networking, I presented an analysis on how information control and information management vulnerability influence trust and privacy concerns in social networking, and how trust and privacy concerns influence the sustainable usage intention of social network services. I also analyzed the factors affecting privacy concerns to present the method to alleviate social network users' concerns about privacy. Information collection control, information processing control and information management vulnerability were chosen and analyzed as the factors affecting privacy concerns. The results showed that information collection control and information management vulnerability significantly affected trust and privacy concerns; and information processing control did not significantly affect privacy concerns. The relationship between trust and privacy concerns, and sustainable usage intention was statistically significant; and the relationship between trust and expansion of communication channels was also statistically significant.

A Study on the Vulnerability Assessment Model for National Defense Intelligence System Using SNA (사회연결망분석 개념을 적용한 국방정보체계 취약점 분석·평가 모형 연구)

  • Jang, Youngcheon;Kang, Kyongran;Choi, Bongwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.3
    • /
    • pp.421-430
    • /
    • 2017
  • In this research, we propose a methodology for assessing security vulnerability of the national defense intelligence system, considering not only target elements but also the interconnection relationship of the whole system. Existing approaches decide the security vulnerability of the whole system by assessing only target elements. However, those approaches have an issue with potentially showing the same outcome for the systems that have identical target elements but the different types of interconnection relationships. We propose a more practical assessment method which takes the interconnection relationship of a whole system into consideration based on the concept of SNA(Social Network Analysis).

Vulnerability of roofing components to wind loads

  • Jayasinghe, N.C.;Ginger, J.D.
    • Wind and Structures
    • /
    • v.14 no.4
    • /
    • pp.321-335
    • /
    • 2011
  • The vulnerability of roofing components of contemporary houses built in cyclonic regions of Australia is assessed for increasing wind speeds. The wind loads and the component strengths are treated as random variables with their probability distributions derived from available data, testing, structural analysis and experience. Design details including types of structural components of houses are obtained from surveying houses and analyzing engineering drawings. Wind load statistics on different areas of the roof are obtained by wind tunnel model studies and compared with Australian/New Zealand Standard, AS/NZS 1170.2. Reliability methods are used for calculating the vulnerability of roofing components independently over the roof. Cladding and batten fixings near the windward gable edge are found to experience larger negative pressures than prescribed in AS/NZS 1170.2, and are most vulnerable to failure.

A mechanical model for the seismic vulnerability assessment of old masonry buildings

  • Pagnini, Luisa Carlotta;Vicente, Romeu;Lagomarsino, Sergio;Varum, Humberto
    • Earthquakes and Structures
    • /
    • v.2 no.1
    • /
    • pp.25-42
    • /
    • 2011
  • This paper discusses a mechanical model for the vulnerability assessment of old masonry building aggregates that takes into account the uncertainties inherent to the building parameters, to the seismic demand and to the model error. The structural capacity is represented as an analytical function of a selected number of geometrical and mechanical parameters. Applying a suitable procedure for the uncertainty propagation, the statistical moments of the capacity curve are obtained as a function of the statistical moments of the input parameters, showing the role of each one in the overall capacity definition. The seismic demand is represented by response spectra; vulnerability analysis is carried out with respect to a certain number of random limit states. Fragility curves are derived taking into account the uncertainties of each quantity involved.

Insights from existing earthquake loss assessment research in Croatia

  • Hadzima-Nyarko, Marijana;Sipos, Tanja Kalman
    • Earthquakes and Structures
    • /
    • v.13 no.4
    • /
    • pp.365-375
    • /
    • 2017
  • Seismic risk management has two main technical aspects: to recommend the construction of high-performance buildings and other structures using earthquake-resistant designs or evaluate existing ones, and to prepare emergency plans using realistic seismic scenarios. An overview of seismic risk assessment methodologies in Croatia is provided with details regarding the components of the assessment procedures: hazard, vulnerability and exposure. For Croatia, hazard is presented with two maps and it is expressed in terms of the peak horizontal ground acceleration during an earthquake, with the return period of 95 or 475 years. A standard building typology catalogue for Croatia has not been prepared yet, but a database for the fourth largest city in Croatia is currently in its initial stage. Two methods for earthquake vulnerability assessment are applied and compared. The first is a relatively simple and fast analysis of potential seismic vulnerability proposed by Croatian researchers using damage index (DI) as a numerical value indicating the level of structural damage, while the second is the Macroseismic method.