• Title/Summary/Keyword: Vulnerability Database

Search Result 83, Processing Time 0.024 seconds

Evaluation of damage probability matrices from observational seismic damage data

  • Eleftheriadou, Anastasia K.;Karabinis, Athanasios I.
    • Earthquakes and Structures
    • /
    • v.4 no.3
    • /
    • pp.299-324
    • /
    • 2013
  • The current research focuses on the seismic vulnerability assessment of typical Southern Europe buildings, based on processing of a large set of observational damage data. The presented study constitutes a sequel of a previous research. The damage statistics have been enriched and a wider damage database (178578 buildings) is created compared to the one of the first presented paper (73468 buildings) with Damage Probability Matrices (DPMs) after the elaboration of the results from post-earthquake surveys carried out in the area struck by the 7-9-1999 near field Athens earthquake. The dataset comprises buildings which developed damage in several degree, type and extent. Two different parameters are estimated for the description of the seismic demand. After the classification of damaged buildings into structural types they are further categorized according to the level of damage and macroseismic intensity. The relative and the cumulative frequencies of the different damage states, for each structural type and each intensity level, are computed and presented, in terms of damage ratio. Damage Probability Matrices (DPMs) are obtained for typical structural types and they are compared to existing matrices derived from regions with similar building stock and soil conditions. A procedure is presented for the classification of those buildings which initially could not be discriminated into structural types due to restricted information and hence they had been disregarded. New proportional DPMs are developed and a correlation analysis is fulfilled with the existing vulnerability relations.

Design of the Specific IP Access Deny for the Database (데이터베이스에서 지정된 IP 주소 접근 금지를 위한 기능 설계)

  • Jang, Seung-Ju;Kim, Sung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.716-721
    • /
    • 2014
  • This paper proposes how to prevent of vulnerability from IP address attack of Oracle DB by C program environments. An attacker may try to login DB by connectng remote IP address. Recently an attacker use foreign IP address and try to connect to DB using known DB account. Therefore, DB data is frequently disclosed. I propose a new idea that develops specific IP address blocking module in C program in the Oracle DB. By this module, we can use the Oracle DB safely.

Pre-earthquake fuzzy logic and neural network based rapid visual screening of buildings

  • Moseley, V.J.;Dritsos, S.E.;Kolaksis, D.L.
    • Structural Engineering and Mechanics
    • /
    • v.27 no.1
    • /
    • pp.77-97
    • /
    • 2007
  • When assessing buildings that may collapse during a large earthquake, conventional rapid visual screening procedures generally provide good results when identifying buildings for further investigation. Unfortunately, their accuracy at identify buildings at risk is not so good. In addition, there appears to be little room for improvement. This paper investigates an alternative screening procedure based on fuzzy logic and artificial neural networks. Two databases of buildings damaged during the Athens earthquake of 1999 are used for training purposes. Extremely good results are obtained from one database and not so good results are obtained from the second database. This finding illustrates the importance of specifically collecting data tailored to the requirements of the fuzzy logic based rapid visual screening procedure. In general, results demonstrate that the trained fuzzy logic based rapid visual screening procedure represents a marked improvement when identifying buildings at risk. In particular, when smaller percentages of the buildings with high damage scores are extracted for further investigation, the proposed fuzzy screening procedure becomes more efficient. This paper shows that the proposed procedure has a significant optimisation potential, is worth pursuing and, to this end, a strategy that outlines the future development of the fuzzy logic based rapid visual screening procedure is proposed.

Vulnerability analysis for privacy security Android apps (개인정보보호 안드로이드 앱에 대한 취약점 분석)

  • Lee, Jung-Woo;Hong, Pyo-Gil;Kim, Dohyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.184-186
    • /
    • 2022
  • Recently, as interest in personal information protection has increased, various apps for personal information protection have emerged. These apps protect data in various formats, such as photos, videos, and documents containing personal information, using encryption and hide functions. These apps can have a positive effect on personal information protection, but in digital forensics, they act as anti-forensic because they can be difficult to analyze data during the investigation process. In this paper, finds out PIN, an access control function, through reverse engineering on Calculator - photo vault, one of the personal information protection apps, and files such as photos and documents to which encryption and hide were applied. In addition, the vulnerability to this app was analyzed by research decryption for database files where logs for encrypted and hide files are stored.

  • PDF

Assessment of Landslide on Climate Change using GIS (GIS를 이용한 기후변화에 따른 산사태 취약성 평가)

  • Xu, Zhen;Kwak, Hanbin;Lee, Woo-Kyun;Park, Taejin;Kwon, Tae-Hyub;Park, Sunmin
    • Journal of Climate Change Research
    • /
    • v.2 no.1
    • /
    • pp.43-54
    • /
    • 2011
  • Recently, due to severe rainfall by the global climate change, natural disasters such as landslide had also been increased rapidly all over the world. Therefore, it has been very necessary to assess vulnerability of landslide and prepare adaptation measures to future climate change. In this study, we employed sensitivity, exposure and adaptative capacity as criteria for assessing the vulnerability of landslide due to climate change. Spatial database for the criteria was constructed using GIS technology. And vulnerability maps on the entire Korea of past and future were made based on the database. As a result, highly vulnerable area for landslide was detected in most area of Gangwon-do, the east of Gyeonggi-do, and southeast of Jeollanam-do, and the southwest of Gyeongsangnam-do. The result of landslide vulnerability depends on time shows that degree of very low class and low class were decreased and degree of moderate, high, and very high were increase from past to the future. Especially, these three classes above low class were significantly increased in the result of far future.

A GIS-Based Seismic Vulnerability Mapping and Assessment Using AHP: A Case Study of Gyeongju, Korea (GIS 기반 AHP를 이용한 지진 취약성 지도제작 및 평가: 경주시를 중심으로)

  • Han, Jihye;Kim, Jinsoo
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.2
    • /
    • pp.217-228
    • /
    • 2019
  • In this study, a seismic vulnerability map of Gyeongju city, where the 9.12 Gyeongju earthquake occurred, was produced and evaluated using analytic hierarchy process(AHP) and geographic information system (GIS). Geotechnical, physical, social, structural, and capacity factors were selected as the main indicators and 18 sub-indicators to construct a spatial database. Weights derived using the AHP were applied to the 18 sub-indicators, which generated a vulnerability map of the five main indicators. After weighting the five generated maps, we created seismic vulnerability maps by overlaying each of the five maps. The seismic vulnerability map was classified into five zones, i.e., very high, high, moderate, low, and safe. For seismic vulnerability, the results indicated that 3% of Gyeongju area is characterized as having very high vulnerability, while 19% was characterized as safe. Based on district standards, Jungbu-dong, Hwangoh-dong, Hwangseong-dong, Seonggeon-dong, and Dongcheon-dong were high-risk areas, and Bodeok-dong, Gangdong-myeon, Yangbuk-myeon, Yangnam-myeon, and Oedong-eup were characterized as safe areas. The seismic vulnerability map produced in this study could possibly be used to minimize damage caused by earthquakes and could be used as a reference when establishing policies.

Design of Road Spatial Information Database for Urban Disaster Management : Focused on Evacuation Vulnerability (방재관점에서의 도로 공간데이터베이스 설계 : 대피위험도를 중심으로)

  • Kim, Ji-Young;Kim, Jung-Ok;Kim, Yong-Il;Yu, Ki-Yun
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2007.04a
    • /
    • pp.413-416
    • /
    • 2007
  • To construct road spatial information database, it is the main object of this study that an analysis of road factors and furthermore this is used to the rescue activities in case of urban disasters. When urban disasters such as earthquake or explosion cause fire and collapses people of the affected region happen to evacuate. But only to manage roads and monitor traffic volume, the road data is designed and managed using digital topographic map so it is short that the design of road spatial data to prevent disasters. In this study, we tried to suggest the evaluative factors of evacuation to design database : road width, traffic volume, the fixed or movable obstacles installed, the surrounding environments that dominate the land-use planning, the uses, materials, structures, sizes, and densities of the buildings. Thus, these could provide fundamental data to determine the disasters management planning for evacuation and rescue activities, to evaluate the riskiness, and to draw up hazard information map.

  • PDF

A Study on Analysis and Control by Vulnerability of Integrated Database (통합 DB의 취약점 분석 및 제어 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.403-406
    • /
    • 2011
  • 현재 DB 보안시스템에서 DB 서버의 주요정보 및 개인정보 등의 전체 오브젝트 정보를 파악하여 보안취약 오브젝트에 대한 인지 및 차단을 수행하고, 업무범위를 벗어난 접근 등에 대한 오남용을 방지하고, 보안취약점을 자체 점검해야 할 필요성이 있다. 본 논문에서는 현 기술로 제어 불가한 DB의 보안취약 오브젝트에 대한 추출과, 추출 정보의 저장 및 관리, 메모리에 적재 및 오브젝트 명과 정보의 치환 분석 등의 보안 적용방안을 연구한다. 또한 보안 대상 내 주요 오브젝트의 변경이력을 관리하고, 보안 취약 오브젝트의 스캔결과 및 정책의 기본관리, 예약수행관리, 관리자 통보 등의 관리방안을 연구한다. 보안 취약에 대한 사전 차단을 위한 제어가능 시스템과의 연동은 ESM 등 정보수집 모듈과의 연동 및 보안정책 적용결과에 대한 연동 및 정책 재적용 방안을 설계한다. 본 논문의 연구는 지능형 DB보안 기능구현을 가능케 할 자료로 사용될 것이다.

  • PDF

Policy-based Security System Modeling using Vulnerable Information (취약성 정보를 활용한 정책 기반 보안 시스템 모델링)

  • Sea, Hee-Suk;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Information Technology Services
    • /
    • v.2 no.2
    • /
    • pp.97-109
    • /
    • 2003
  • As the importance and the need for network security is increased, many organization uses the various security systems. They enable to construct the consistent integrated security environment by sharing the vulnerable information among firewall, intrusion detection system, and vulnerable scanner. And Policy-based network provides a means by which the management process can be simplified and largely automated. In this article we build a foundation of policy-based network modeling environment. The procedure and structure for policy rule induction from vulnerabilities stored in SVDB (Simulation based Vulnerability Data Based) is conducted. It also transforms the policy rules into PCIM (Policy Core Information Model).

A Study on Intelligent Vulnerability DB Security System apply to Smart Grid (지능적 취약점 DB 보안 시스템의 Smart Grid 적용 연구)

  • Lee, Bo-Man;Park, Dea-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.203-206
    • /
    • 2011
  • 차세대 전력망인 Smart Grid는 에너지 효율성을 높이기 위한 대안이다. 현재 Smart Grid는 빠른 진행 속도에 비해 보안상 취약점을 다수 내포하고 있다. 이에 Smart Grid의 보안 취약점들을 분석하고, 취약점들에 대한 대응책을 마련하기 위한 방법을 연구하며, 그에 따른 보안 정책을 개발하여, 이들을 저장하여 보안 DB를 구축하고, 보안 시스템을 개발하여 지능적 취약점 DB 보안 시스템을 작동 시킬 수 있는 방법을 연구하여 다가올 보안 위협에 대응 할 수 있도록 하여 Smart Grid 시대의 발전에 기여 할 것이다.

  • PDF