• Title/Summary/Keyword: Vulnerability analysis

Search Result 1,273, Processing Time 0.033 seconds

Simulation-based Network Vulnerability Analysis Using the SIMVA (SIMVA를 이용한 시뮬레이션 기반의 네트워크 취약성 분석)

  • 유용준;이장세;지승도
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2004.05a
    • /
    • pp.13-19
    • /
    • 2004
  • 본 논문은 SIMVA(Simulation Vulnerability Analyzer)를 이용한 시뮬레이션 기반의 네트워크 취약성 분석을 주목적으로 한다 SIMVA는 네트워크 상태를 감시하고, 이를 토대로 취약성을 분석하기 위하여 개발된 S/W로서, SES/MB (System Entity Structure / Model Base) 프레임워크 및 DEVS(Discrete Event System Specification) 이론을 적용하여 네트워크 보안 모델링을 수행할 수 있으며, 취약성 메트릭스를 통하여 정량적으로 취약성을 분석할 수 있다. 본 연구에서는 SIMVA를 이용하여 최근 네트워크 보안 문제에 심각한 영향을 미치는 슬래머 웜 공격 시나리오에 대한 취약성 분석을 수행함으로써 SIMVA의 검증 및 적용 가능성을 제시한다.

  • PDF

County-Based Vulnerability Evaluation to Agricultural Drought Using Principal Component Analysis - The case of Gyeonggi-do - (주성분 분석법을 이용한 시군단위별 농업가뭄에 대한 취약성 분석에 관한 연구 - 경기도를 중심으로 -)

  • Jang, Min-Won
    • Journal of Korean Society of Rural Planning
    • /
    • v.12 no.1 s.30
    • /
    • pp.37-48
    • /
    • 2006
  • The objectives of this study were to develop an evaluation method of regional vulnerability to agricultural drought and to classify the vulnerability patterns. In order to test the method, 24 city or county areas of Gyeonggi-do were chose. First, statistic data and digital maps referred for agricultural drought were defined, and the input data of 31 items were set up from 5 categories: land use factor, water resource factor, climate factor, topographic and soil factor, and agricultural production foundation factor. Second, for simplification of the factors, principal component analysis was carried out, and eventually 4 principal components which explain about 80.8% of total variance were extracted. Each of the principal components was explained into the vulnerability components of scale factor, geographical factor, weather factor and agricultural production foundation factor. Next, DVIP (Drought Vulnerability Index for Paddy), was calculated using factor scores from principal components. Last, by means of statistical cluster analysis on the DVIP, the study area was classified as 5 patterns from A to E. The cluster A corresponds to the area where the agricultural industry is insignificant and the agricultural foundation is little equipped, and the cluster B includes typical agricultural areas where the cultivation areas are large but irrigation facilities are still insufficient. As for the cluster C, the corresponding areas are vulnerable to the climate change, and the D cluster applies to the area with extensive forests and high elevation farmlands. The last cluster I indicates the areas where the farmlands are small but most of them are irrigated as much.

Climate Change Vulnerability Assessment in Rural Areas - Case study in Seocheon - (농촌지역 기후변화 취약성 평가에 관한 연구 - 서천군을 대상으로 -)

  • Lee, Gyeongjin;Cha, Jungwoo
    • Journal of Korean Society of Rural Planning
    • /
    • v.20 no.4
    • /
    • pp.145-155
    • /
    • 2014
  • Since greenhouse gas emissions increase continuously, the authorities have needed climate change countermeasure for adapting the acceleration of climate change damages. According to "Framework Act on Low Carbon, Green Growth", Korean local governments should have established the implementation plan of climate change adaptation. These guidelines which is the implementation plan of climate change adaptation should be established countermeasure in 7 fields such as Health, Digester/Catastrophe, Agriculture, Forest, Ecosystem, Water Management and Marine/Fisheries. Basically the Korean local governments expose vulnerable financial condition, therefore the authorities might be assessed the vulnerability by local regions and fields, in order to establish an efficient implementation plan of climate change adaptation. Based on this concepts, this research used 3 methods which are LCCGIS, questionnaire survey analysis and analysis of existing data for the multiphasic vulnerable assessment. This study was verified the correlation among 7 elements of climate change vulnerability by 3 analysis methods, in order to respond climate change vulnerability in rural areas, Seocheon-gun. If the regions were evaluated as a vulnerable area by two or more evaluation methods in the results of 3 methods' comparison and evaluation, those areas were selected by vulnerable area. As a result, the vulnerable area of heavy rain and flood was Janghang-eup and Maseo-myeon, the vulnerable area of typhoon was Janghang-eup, Masan-myeon and Seo-myeon. 3 regions (i.e. Janghang-eup, Biin-myeon, Seo-myeon) were vulnerable to coastal flooding, moreover Masan-myeon, Pangyo-myeon and Biin-myeon exposed to vulnerability of landslide. In addition, Pangyo-myeon, Biin-myeon and Masan-myeon was evaluated vulnerable to forest fire, as well as the 3 sites; Masan-myeon, Masan-myeon and Pangyo-myeon was identified vulnerable to ecosystem. Lastly, 3 regions (i.e. Janghang-eup, Masan-myeon and Masan-myeon) showed vulnerable to flood control, additionally Janghang-eup and Seo-myeon was vulnerable to water supply. However, all region was evaluated vulnerable to water quality separately. In a nutshell this paper aims at deriving regions which expose climate change vulnerabilities by multiphasic vulnerable assessment of climate change, and comparing-evaluating the assessments.

Development of Internet Vulnerability Index for Youth through Internet Overdependency Analysis (인터넷 과의존 요인분석을 통한 청소년의 인터넷 취약성 지수 개발)

  • Jung, Nam-Su;Choi, Myeong-Ok;Lee, Young-Sun;Ahn, Hu-Nam
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.4
    • /
    • pp.345-358
    • /
    • 2019
  • The purpose of this study is to develop the Internet vulnerability index of adolescents. To do this, we used the original data of long - term follow - up survey for the internet overdependency cause analysis conducted by NIA in 2018, and analyzed the correlation between alternatives of internet vulnerability index and personal psychology by using linear regression analysis. Factor analysis showed that the relationship with the surroundings was indexed by adding 9 items to positive factors such as family acceptance, peer attachment, and teacher favorability. The relationship between the surroundings and self - stigmatization is confirmed, and the relationship between the surroundings and the Internet fragility is predicted to be negatively related, and the digital capacity is also assumed to be negatively correlated with the Internet vulnerability. In order to develop the specific form of the Internet vulnerability index, personal psychology and linear regression analysis were conducted. As a result, positive factors and R value of personal psychology were increased when considering the relationship with the environment and the digital capacity rather than the Internet overdependency model. Based on these implications, we discussed the implications and limitations of this study.

A Development of Hit Probability-based Vulnerability Analysis System for Armored Fighting Vehicle using Fault Tree Analysis Technique (FTA 기법을 활용한 피격 확률 기반의 전차 취약성 분석 시스템 개발)

  • Hwang, Hun-Gyu;Yoo, Byeong-Gyu;Lee, Jae-Woong;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1981-1989
    • /
    • 2015
  • Recently, the development of reliability analysis system for combat system is required, because, necessities of integrated reliability analysis research are emphasized. In this paper, we develop a system which analyzes vulnerabilities for tank(or armored vehicle) based on the fault tree analysis(FTA) technique. The FTA is representative technique of reliability analysis to find cause of fault and calculate probability of fault. To do this, we propose a method to apply FTA technique into domain of vulnerability analysis for tank. Also, we develop the vulnerability analysis system using the proposed method. The system analyzes hit probabilities of components of tank based on multiple shot-lines, and calculates kill probabilities. The analyzed and calculated data support vulnerability analysis of tank.

The Vulnerability Analysis for Virtualization Environment Risk Model Management Systematization (가상화 환경 위험도 관리체계화를 위한 취약점 분석)

  • Park, Mi-Young;Seung, Hyen-Woo;Lim, Yang-Mi
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.23-33
    • /
    • 2013
  • Recently in the field of IT, cloud computing technology has been deployed rapidly in the current society because of its flexibility, efficiency and cost savings features. However, cloud computing system has a big problem of vulnerability in security. In order to solve the vulnerability of cloud computing systems security in this study, impact types of virtual machine about the vulnerability were determined and the priorities were determined according to the risk evaluation of virtual machine's vulnerability. For analyzing the vulnerability, risk measurement standards about the vulnerability were defined based on CVSS2.0, which is an open frame work; and the risk measurement was systematized by scoring for relevant vulnerabilities. Vulnerability risk standards are considered to suggest fundamental characteristics of vulnerability and to provide the degree of risks and consequently to be applicable to technical guides to minimize the vulnerability. Additionally, suggested risk standard of vulnerability is meaningful as the study content itself and could be used in technology policy project which is to be conducted in the future.

Vulnerability Assessment of Water Supply in Agricultural Reservoir Utilizing Probability Distribution and Reliability Analysis Methods (농업용 저수지 공급량과 수요량의 확률분포 및 신뢰성 해석 기법을 활용한 물 공급 취약성 평가)

  • Nam, Won-Ho;Kim, Tae-Gon;Choi, Jin-Yong;Lee, Jeong-Jae
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.54 no.2
    • /
    • pp.37-46
    • /
    • 2012
  • The change of rainfall pattern and hydrologic factors due to climate change increases the occurrence probability of agricultural reservoir water shortage. Water supply assessment of reservoir is usually performed current reservoir level compared to historical water levels or the simulation of reservoir operation based on the water budget analysis. Since each reservoir has the native property for watershed, irrigation district and irrigation water requirement, it is necessary to improve the assessment methods of agricultural reservoir water capability about water resources system. This study proposed a practical methods that water supply vulnerability assessment for an agricultural reservoir based on a concept of probabilistic reliability. The vulnerability assessment of water supply is calculated from probability distribution of water demand condition and water supply condition that influences on water resources management and reservoir operations. The water supply vulnerability indices are estimated to evaluate the performance of water supply on agricultural reservoir system, and thus it is recommended a more objective method to evaluate water supply reliability.

Intensity measure-based probabilistic seismic evaluation and vulnerability assessment of ageing bridges

  • Yazdani, Mahdi;Jahangiri, Vahid
    • Earthquakes and Structures
    • /
    • v.19 no.5
    • /
    • pp.379-393
    • /
    • 2020
  • The purpose of this study is to first evaluate the seismic behavior of ageing arch bridges by using the Intensity Measure - based demand and DCFD format, which is referred to as the fragility-hazard format. Then, an investigation is performed for their seismic vulnerability. Analytical models are created for bridges concerning different features and these models are subjected to Incremental Dynamic Analysis (IDA) analysis using a set of 22 earthquake records. The hazard curve and results of IDA analysis are employed to evaluate the return period of exceeding the limit states in the IM-based probabilistic performance-based context. Subsequently, the fragility-hazard format is used to assess factored demand, factored capacity, and the ratio of the factored demand to the factored capacity of the models with respect to different performance objectives. Finally, the vulnerability curves are obtained for the investigated bridges in terms of the loss ratio. The results revealed that decreasing the span length of the unreinforced arch bridges leads to the increase in the return period of exceeding various limit states and factored capacity and decrease in the displacement demand, the probability of failure, the factored demand, as well as the factored demand to factored capacity ratios, loss ratio, and seismic vulnerability. Finally, it is derived that the probability of the need for rehabilitation increases by an increase in the span length of the models.

Assessing Web Browser Security Vulnerabilities with respect to CVSS

  • Joh, HyunChul
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.199-206
    • /
    • 2015
  • Since security vulnerabilities newly discovered in a popular Web browser immediately put a number of users at risk, urgent attention from developers is required to address those vulnerabilities. Analysis of characteristics in the Web browser vulnerabilities can be used to assess security risks and to determine the resources needed to develop patches quickly to handle vulnerabilities discovered. So far, being a new research area, the quantitative aspects of the Web browser vulnerabilities and risk assessments have not been fully investigated. However, due to the importance of Web browser software systems, further detailed studies are required related to the Web browser risk assessment, using rigorous analysis of actual data which can assist decision makers to maximize the returns on their security related efforts. In this paper, quantitative software vulnerability analysis has been presented for major Web browsers with respect to the Common Vulnerability Scoring System. Further, vulnerability discovery trends in the Web browsers are also investigated. The results show that, almost all the time, vulnerabilities are compromised from remote networks with no authentication required systems. It is also found that a vulnerability discovery model which was originally introduced for operating systems is also applicable to the Web browsers.

A Study on the Design of Security Metrics for Source Code (소스코드의 보안성 메트릭 설계에 관한 연구)

  • Seo, Dong-Su
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.147-155
    • /
    • 2010
  • It has been widely addressed that static analysis techniques can play important role in identifying potential security vulnerability reside in source code. This paper proposes the design and application of security metrics that use both vulnerability information extracted from the static analysis, and significant factors of information that software handles. The security metrics are useful for both developers and evaluators in that the metrics help them identity source code vulnerability in early stage of development. By effectively utilizing the security metrics, evaluators can check the level of source code security, and confirm the final code depending on the characteristics of the source code and the security level of information required.