• 제목/요약/키워드: Vulnerability Assessment System

검색결과 189건 처리시간 0.026초

Vulnerability Assessment of a Large Sized Power System Using Neural Network Considering Various Feature Extraction Methods

  • Haidar, Ahmed M. A;Mohamed, Azah;Hussian, Aini
    • Journal of Electrical Engineering and Technology
    • /
    • 제3권2호
    • /
    • pp.167-176
    • /
    • 2008
  • Vulnerability assessment of power systems is important so as to determine their ability to continue to provide service in case of any unforeseen catastrophic contingency such as power system component failures, communication system failures, human operator error, and natural calamity. An approach towards the development of on-line power system vulnerability assessment is by means of using an artificial neural network(ANN), which is being used successfully in many areas of power systems because of its ability to handle the fusion of multiple sources of data and information. An important consideration when applying ANN in power system vulnerability assessment is the proper selection and dimension reduction of training features. This paper aims to investigate the effect of using various feature extraction methods on the performance of ANN as well as to evaluate and compare the efficiency of the proposed feature extraction method named as neural network weight extraction. For assessing vulnerability of power systems, a vulnerability index based on power system loss is used and considered as the ANN output. To illustrate the effectiveness of ANN considering various feature extraction methods for vulnerability assessment on a large sized power system, it is verified on the IEEE 300-bus test system.

가상화 환경에서 호스트 기반 취약점 분석 시스템을 위한 효율적인 에이전트 프레임워크 (An Efficient Agent Framework for Host-based Vulnerability Assessment System in Virtualization Environment)

  • 양진석;정태명
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제3권1호
    • /
    • pp.23-30
    • /
    • 2014
  • 본 논문에서는 가상화 환경에서 호스트 기반 취약점 분석 시스템의 에이전트 프레임워크를 제안한다. 기존 호스트 기반 취약점은 점검 대상 시스템에 에이전트를 반드시 설치하여 운용해야만 했지만 제안한 에이전트 프레임워크는 점검 대상 가상머신에 에이전트를 복사 및 실행하는 개념을 가진다. 본 논문에서는 가상화 환경에서 호스트 기반 취약점 분석 시스템 에이전트 프레임워크를 수립하였으며 점검 시나리오를 기술하고 해당 시나리오에 대한 파일럿 시스템을 개발하였다. 제안하는 에이전트 프레임워크는 점검 대상 시스템 추가 시에도 에이전트의 추가 설치가 없어 시스템 확장성을 극대화하였으며 에이전트의 불필요한 자원 낭비 등 기존 시스템의 단점을 개선하였다.

VULNERABILITY ASSESSMENTS AND RISK MANAGEMENT FOR CRITICAL INFRASTRUCTURES FROM HOMELAND SECURITY VIEWPOINTS

  • Chun Nen Huang;Yao-Chen Kuo
    • 국제학술발표논문집
    • /
    • The 3th International Conference on Construction Engineering and Project Management
    • /
    • pp.292-301
    • /
    • 2009
  • The employment of risk management theory in Urban Disaster Management System (UDMS) has become an important trend in recent years. The viewpoint of risk management is mainly a comprehensive risk assessment of various internal and external factors, and a subsequent handling of risks. Through continuous and systematic accumulation and analysis of risk information, disaster prevention and rescue system is established. Taking risk management theory as the foundation, Organization for Economic Cooperation and Development (OECD) has developed a series of UDMS in the mega-cities all over the world. With this system as a common platform, OECD cooperates with different cities to develop disaster prevention and rescue system consisting of vulnerability assessment methods, risk assessment and countermeasures. The paper refers to the urban disaster vulnerability assessment and risk management of OECD and the mega-cities of different advanced and developed countries in the world, and then constructs a preliminarily drafted structure for the vulnerability assessment methods and risk management mechanism in the metropolitan districts of Taiwan.

  • PDF

폭염과 가뭄을 위한 기후변화 취약성 평가 데이터베이스 시스템 설계 (Design of Climate Change Vulnerability Assessment Database System for Heat wave and Drought)

  • 정은화;김철원;박종훈
    • 한국전자통신학회논문지
    • /
    • 제13권4호
    • /
    • pp.813-818
    • /
    • 2018
  • 본 논문에서는 가뭄에 의한 용수, 가뭄에 의한 수질과 폭염에 의한 온열질환에 대한 취약성 평가 항목에 대한 선정 배경을 기술하였고, 선정된 취약성 평가 항목에 대해 취약성 평가 가중치 산정을 수행하였다. 또한 취약성 평가절차에서는 단계적으로 적용되는 계산 방법과 실제 사례를 함께 서술하였다. 취약성 평가 데이터베이스 구축에 대해 분석하고, 이러한 취약성 평가 절차를 적용한 폭염과 가뭄을 위한 기후변화 취약성 평가 시스템을 설계하였다.

재해 취약성 평가를 위한 기상자료 처리 프로그램 MetSystem 개발 (Development of Meteorologic Data Retrieval Program for Vulnerability Assessment to Natural Hazards)

  • 장민원;김상민
    • 농촌계획
    • /
    • 제19권4호
    • /
    • pp.47-54
    • /
    • 2013
  • Climate change is the most direct threatening factors in sustaining agricultural productivity. It is necessary to reduce the damages from the natural hazards such as flood, drought, typhoons, and snowstorms caused by climate change. Through the vulnerability assessment to adapt the climate change, it is possible to analyze the priority, feasibility, effect of the reduction policy. For the vulnerability assessment, broad amount of weather data for each meterological station are required. Making the database management system for the meteorologic data could troubleshoot of the difficulties lie in handling and processing the weather data. In this study, we generated the meteorologic data retrieval system (MetSystem) for climate change vulnerability assessment. The user interface of MetSystem was implemented in the web-browser so as to access to a database server at any time and place, and it provides different query executions according to the criteria of meteorologic stations, temporal range, meteorologic items, statistics, and range of values, as well as the function of exporting to Excel format (*.xls). The developed system is expected that it will make it easier to try different analyses of vulnerability to natural hazards by the simple access to meteorologic database and the extensive search functions.

사회연결망분석 개념을 적용한 국방정보체계 취약점 분석·평가 모형 연구 (A Study on the Vulnerability Assessment Model for National Defense Intelligence System Using SNA)

  • 장영천;강경란;최봉완
    • 한국군사과학기술학회지
    • /
    • 제20권3호
    • /
    • pp.421-430
    • /
    • 2017
  • In this research, we propose a methodology for assessing security vulnerability of the national defense intelligence system, considering not only target elements but also the interconnection relationship of the whole system. Existing approaches decide the security vulnerability of the whole system by assessing only target elements. However, those approaches have an issue with potentially showing the same outcome for the systems that have identical target elements but the different types of interconnection relationships. We propose a more practical assessment method which takes the interconnection relationship of a whole system into consideration based on the concept of SNA(Social Network Analysis).

계층적 가중 기반의 취약점 영향성 평가 스코어링 시스템에 대한 연구 (A Study on Layered Weight Based Vulnerability Impact Assessment Scoring System)

  • 김영종
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제8권7호
    • /
    • pp.177-180
    • /
    • 2019
  • 대표적인 취약점 스코어링 시스템은 CVSS다. 하지만 CVSS는 취약점이 자산에 미치는 영향성 관점을 평가 하지 않아 사용되지 않거나 중요도가 낮은 자산에 대해서도 동일한 우선순위로 처리해야하기 때문에 대규모 시스템의 위험도가 높은 취약점의 경우 효과적이고 신속한 대응을 할 수 없다. 시스템 구성을 계층화 하고, 계층 간의 그리고 계층내의 중요도에 따른 가중을 평가하는 영향성 관점의 평가 시스템인 계층적 가중 기반의 취약점 영향성 평가 스코어링 시스템을 제안한다.

시스템 취약점 분석을 통한 침투 경로 예측 자동화 기법 (Automated Attack Path Enumeration Method based on System Vulnerabilities Analysis)

  • 김지홍;김휘강
    • 정보보호학회논문지
    • /
    • 제22권5호
    • /
    • pp.1079-1090
    • /
    • 2012
  • 조직 내에 정보자산들의 숫자가 증가하고, 관련된 취약점의 종류와 개수가 증가함에 따라 조직 내 네트워크에 어떠한 취약점이 존재하는지 파악하는 것이 점차 어려워지고 있다. 취약점 데이터베이스 및 이를 활용한 취약점 분석 관련 정량적 분석 기준들 역시 존재하지만, 각각의 보안전문가들의 주관적인 기준에 따른 평가방식과, 수동적 측정 방법으로 인해 네트워크 시스템의 위험도 및 공격 침투 경로를 정량적 평가에 기반하여 예측하기에 효율적이지 못한 문제가 있다. 본 논문에서는 자동화된 취약점 평가 및 공격 침투 경로 예측 시스템인 HRMS(Hacking and Response Measurement System)를 제안하고, 네트워크 시스템 내 예상 공격 경로를 도출한 결과를 제시하였다. HRMS는 정보자산에 대한 충분한 정보가 주어지지 않았다 하더라도, 기존에 알려진 시스템 또는 어플리케이션의 보안관련 평판치를 취약점 평가지표를 기반으로 계산하여, exploitability를 산정하고 attack graph 경로를 생성한다는 점에서 효율적이라 할 수 있다. 본 논문에서 제안한 HRMS를 이용하여 적극적인 취약점 분석을 통한 보안관리를 할 때에 공격경로 예상을 통한 능동적인 대응책을 마련할 수 있을 것이다.

농업용 저수지 공급량과 수요량의 확률분포 및 신뢰성 해석 기법을 활용한 물 공급 취약성 평가 (Vulnerability Assessment of Water Supply in Agricultural Reservoir Utilizing Probability Distribution and Reliability Analysis Methods)

  • 남원호;김태곤;최진용;이정재
    • 한국농공학회논문집
    • /
    • 제54권2호
    • /
    • pp.37-46
    • /
    • 2012
  • The change of rainfall pattern and hydrologic factors due to climate change increases the occurrence probability of agricultural reservoir water shortage. Water supply assessment of reservoir is usually performed current reservoir level compared to historical water levels or the simulation of reservoir operation based on the water budget analysis. Since each reservoir has the native property for watershed, irrigation district and irrigation water requirement, it is necessary to improve the assessment methods of agricultural reservoir water capability about water resources system. This study proposed a practical methods that water supply vulnerability assessment for an agricultural reservoir based on a concept of probabilistic reliability. The vulnerability assessment of water supply is calculated from probability distribution of water demand condition and water supply condition that influences on water resources management and reservoir operations. The water supply vulnerability indices are estimated to evaluate the performance of water supply on agricultural reservoir system, and thus it is recommended a more objective method to evaluate water supply reliability.

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei;Yang, Chaofan;Zhang, Zeqing;Xue, Xingsi;Haga, Reiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권12호
    • /
    • pp.4531-4544
    • /
    • 2021
  • Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.