• Title/Summary/Keyword: Vulnerability analysis

Search Result 1,273, Processing Time 0.043 seconds

Browser fuzzing and analysis using known vulnerability (파이썬 모듈과 정규표현식을 활용한 웹 취약점 탐색 자동화 봇)

  • Kim, Nam-gue;Kim, Ki Hwan;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.749-751
    • /
    • 2016
  • Internet technology is universal, news from the Web browser, shopping, search, etc., various activities have been carried out. Its size becomes large, increasing the scale of information security incidents, as damage to this increases the safety for the use of the Internet is emphasized. IE browser is ASLR, such as Isolated Heap, but has been continually patch a number of vulnerabilities, such as various protection measures, this vulnerability, have come up constantly. And, therefore, in order to prevent security incidents, it is necessary to be removed to find before that is used to exploit this vulnerability. Therefore, in this paper, we introduce the purge is a technique that is used in the discovery of the vulnerability, we describe the automation technology related thereto. And utilizing the known vulnerabilities, and try to show any of the typical procedures for the analysis of the vulnerability.

  • PDF

Sensitivity analysis of flood vulnerability index of levee according to climate change (기후변화에 따른 제방의 홍수취약성지수 민감도 분석)

  • Lee, Hoo Sang;Lee, Jae Joon
    • Journal of Korea Water Resources Association
    • /
    • v.51 no.spc
    • /
    • pp.1161-1169
    • /
    • 2018
  • In this study, a new methodology was proposed to evaluate the flood vulnerability of river levee and to investigate the effect on the levee where the water level changes according to climate change. The stability of levee against seepage was evaluated using SEEP/W model which is two-dimensional groundwater infiltration model. In addition to the infiltration behavior, it is necessary to analyze the vulnerability of the embankment considering the environmental conditions of the river due to climate change. In this study, the levee flood vulnerability index (LFVI) was newly developed by deriving the factors necessary for the analysis of the levee vulnerability. The size of river levee was investigated by selecting the target area. The selected levees were classified into upstream part, midstream part and downstream part at the nearside of Seoul in the Han river, and the safety factor of the levee was analyzed by applying the design flood level of the levee. The safety ratio of the levee was analyzed by applying the design flood level considering the current flood level and the scenario of climate change RCP8.5. The degree of change resulting from climate change was identified for each factor that forms the levee flood vulnerability index. By using the levee flood vulnerability index value utilizing these factors comprehensively, it was finally possible to estimate the vulnerability of levee due to climate change.

Calculation of the area of vulnerability to voltage sags in power systems (전력계통에서의 순간전압강하에 대한 취약지역 계산)

  • Park, Chang-Hyun;Han, Jong-Hoon;Jang, Gil-Soo;Lee, Kyung-Ho;Hong, Jun-Hee
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.107-108
    • /
    • 2008
  • This paper surveys areas of vulnerability to voltage sags in KEPCO system. The area of vulnerability can be defined as the region where the occurrence of faults will lead to voltages lower than the sensitivity threshold of equipment. The analysis of the area of vulnerability is essential for estimating system voltage sag performance and establishing efficient countermeasures for voltage sag problems. In this paper, two buses in KEPCO system were randomly selected and the areas of vulnerability for the buses were calculated by using dedicated software.

  • PDF

Vulnerability Assessment of Idleness in Rural Areas from Multiple Perspectives (인구, 주택, 농지 측면에서의 농촌지역 유휴화 취약성 평가)

  • Lee, Jimin;Choi, Won
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.64 no.2
    • /
    • pp.15-25
    • /
    • 2022
  • Idleness in rural areas is a very important issue with regard to national land space management. Previous studies have been conducted separately in terms of population housing and farmland. So, an integrated analysis considering population housing and farmland is required for rural spatial management. In this study, vulnerability indices were developed and spatial distribution of the vulnerable areas was analyzed by evaluating regional vulnerability on population, housing, and farmland. In addition, plans for rural space management plan were proposed considering the population hollowing out and the idle farmland. The results of this study would be helpful in preparing policies that take into account the vulnerability of idleness in rural areas.

VULNERABILITY ASSESSMENTS AND RISK MANAGEMENT FOR CRITICAL INFRASTRUCTURES FROM HOMELAND SECURITY VIEWPOINTS

  • Chun Nen Huang;Yao-Chen Kuo
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.292-301
    • /
    • 2009
  • The employment of risk management theory in Urban Disaster Management System (UDMS) has become an important trend in recent years. The viewpoint of risk management is mainly a comprehensive risk assessment of various internal and external factors, and a subsequent handling of risks. Through continuous and systematic accumulation and analysis of risk information, disaster prevention and rescue system is established. Taking risk management theory as the foundation, Organization for Economic Cooperation and Development (OECD) has developed a series of UDMS in the mega-cities all over the world. With this system as a common platform, OECD cooperates with different cities to develop disaster prevention and rescue system consisting of vulnerability assessment methods, risk assessment and countermeasures. The paper refers to the urban disaster vulnerability assessment and risk management of OECD and the mega-cities of different advanced and developed countries in the world, and then constructs a preliminarily drafted structure for the vulnerability assessment methods and risk management mechanism in the metropolitan districts of Taiwan.

  • PDF

Development and Application of Vulnerability Analysis Index for River Levee (하천 제방의 취약성 분석 지수 개발 및 적용)

  • Lee, Hoosang;Lee, Jaejoon
    • Journal of Wetlands Research
    • /
    • v.21 no.spc
    • /
    • pp.134-140
    • /
    • 2019
  • In this study, we propose a new method for evaluating the vulnerability to flooding river levee. The purpose of this study is to examine how to apply the factors necessary to calculate the proposed levee flood index. To do this, the safety flood level was analyzed by applying the planned flood level. The levee flood vulnerabilities index was calculated based on seven factors such as freeboard, levee crown section, levee section ratio, safety factor, raised spot length, Seepage line change degree, and critical velocity. The Levee Flood Vulnerability Index(LFVI) of the levee developed in this study was used to levee vulnerability analysis. The results of the analysis were divided into 1 to 7 grades using Levee Flood Vulnerability Index(LFVI).

The Analysis of Crime-Vulnerability Assessment using Spatial Data for Planning CPTED (셉테드(CPTED) 계획 수립을 위한 공간정보를 활용한 범죄취약성 평가)

  • Kim, Yeon-Seong;OH, Jeong-Won;Seo, Won-Chan;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.5
    • /
    • pp.917-930
    • /
    • 2021
  • Recently, as part of the crime prevention measures that focus on spatial characteristics on the determinants of crime-causing, interest in crime prevention (CPTED) through environmental design has been increasing. This study analyzed crime vulnerabilities in Ulju-gun for the purpose of establishing a master plan for crime prevention urban design (CPTED). The 12 indicators, including demographic, socioeconomic, and physical factors, were sampled from prior studies. As a next step, statistical analysis resulted in criminal vulnerability indexes. According to the analysis, districts with a high demographic crime vulnerability indexes were concentrated on apartment complexes, while districts with high socio-economic crime vulnerability indexes have low land prices and high proportion of female population. Also, the districts with high physical crime vulnerability indexes were found to be heavily distributed commercial ones with a large number of entertainment places. However, there was a limit to generalizing the indicators of previous studies to local governments with different regional characteristics. Therefore, further studies should be carried out by establishing additional indicators considering regional characteristics in the future.

Rapid Seismic Vulnerability Assessment Method for Generic Structures (일반 구조물에 대한 신속한 지진 취약성 분석 방법)

  • Jeong, Seong-Hoon;Choi, Sung-Mo;Kim, Kang-Su
    • Journal of the Korea Concrete Institute
    • /
    • v.20 no.1
    • /
    • pp.51-58
    • /
    • 2008
  • Analytical probabilistic vulnerability analysis requires extensive computing effort as a result of the randomness in both input motion and response characteristics. In this study, a new methodology whereby a set of vulnerability curves are derived based on the fundamental response quantities of stiffness, strength and ductility is presented. A response database of coefficients describing lognormal vulnerability relationships is constructed by employing aclosed-form solution for a generalized single-degree-of-freedom system. Once the three fundamental quantities of a wide range of structural systems are defined, the vulnerability curves for various limit states can be derived without recourse to further simulation. Examples of application are given and demonstrate the extreme efficiency of the proposed approach in deriving vulnerability relationships.

Vulnerability Analysis and Threat Mitigation for Secure Web Application Development (안전한 웹 애플리케이션 개발을 위한 취약점 분석 및 위협 완화)

  • Moon, Jae-Chan;Cho, Seong-Je
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.127-137
    • /
    • 2012
  • Recently, as modern Internet uses mashups, Web 3.0, JavaScript/AJAX widely, the rate at which new vulnerabilities are being discovered is increasing rapidly. It can subsequently introduce big security threats. In order to efficiently mitigate these web application vulnerabilities and security threats, it is needed to rank vulnerabilities based on severity and consider the severe vulnerabilities during a specific phase of software development lifecycle (SDLC) for web applications. In this paper, we have first verified whether the risk rating methodology of OWASP Top 10 vulnerabilities is a reasonable one or not by analyzing the vulnerability data of web applications in the US National Vulnerability Database (NVD). Then, by inspecting the vulnerability information of web applications based on OWASP Top-10 2010 list and CWE (Common Weakness Enumeration) directory, we have mapped the web-related entries of CWE onto the entries of OWASP Top-10 2010 and prioritized them. We have also presented which phase of SDLC is associated with each vulnerability entry. Using this approach, we can prevent or mitigate web application vulnerabilities and security threats efficiently.

Automated Attack Path Enumeration Method based on System Vulnerabilities Analysis (시스템 취약점 분석을 통한 침투 경로 예측 자동화 기법)

  • Kim, Ji Hong;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1079-1090
    • /
    • 2012
  • As the number of information asset and their vulnerabilities are increasing, it becomes more difficult for network security administrators to assess security vulnerability of their system and network. There are several researches for vulnerability analysis based on quantitative approach. However, most of them are based on experts' subjective evaluation or they require a lot of manual input for deriving quantitative assessment results. In this paper, we propose HRMS(Hacking and Response Measurement System) for enumerating attack path using automated vulnerability measurement automatically. HRMS can estimate exploitability of systems or applications based on their known vulnerability assessment metric, and enumerate attack path even though system, network and application's information are not fully given for vulnerability assessment. With this proposed method, system administrators can do proactive security vulnerability assessment.