• 제목/요약/키워드: Vulnerability analysis

검색결과 1,283건 처리시간 0.026초

홍수시 얕은기초의 세굴위험도 평가 사례연구 (A Case Study of Scour Vulnerability Evaluation for Shallow Foundations during Floods)

  • 박재현;이주형;정문경;곽기석
    • 한국방재학회:학술대회논문집
    • /
    • 한국방재학회 2008년도 정기총회 및 학술발표대회
    • /
    • pp.59-62
    • /
    • 2008
  • Scour vulnerability evaluation for shallow foundations was performed to assure bridge safety against scour in the national capital region. The case studies for 26 shallow foundations consisted of site investigation including boring test, bridge scour analysis for the design flood, bearing capacity evaluation of the bridge foundation before and after scour, and comprehensive evaluation of bridge scour vulnerability. Bridge scour vulnerability was determined based on the interdisciplinary concept considering predicted scour depth for the design floods and bearing capacity of foundation as well as dimensions of foundation. Nine of 26 shallow foundations showed the potential future vulnerability to scour with significant decrease in the bearing capacity of foundations due to scour and the remaining 17 were expected to maintain their stability against scour.

  • PDF

The Plan and Tools for Vulnerability Testing in Information Software-Based System

  • Kim, In-Jung;Lee, Young-Gyo;Won, Dong-Ho
    • Journal of Information Processing Systems
    • /
    • 제1권1호
    • /
    • pp.75-78
    • /
    • 2005
  • Although many tests for stabilization of the software have been done, vulnerability test for a system run by combination of the software of various products has not been conducted enough. This has led to increased threats and vulnerability of system. Especially, web-based software system, which is public, has inherent possibility of exposure to attacks and is likely to be seriously damaged by an accident. Consequently, comprehensive and systematic test plans and techniques are required. Moreover, it is necessary to establish a procedure for managing and handling the results of vulnerability test. This paper proposes vulnerability test plans and designs for implementing automated tools, both of which can be complied with on web-based software systems.

Modeling Vulnerability Discovery Process in Major Cryptocurrencies

  • Joh, HyunChul;Lee, JooYoung
    • Journal of Multimedia Information System
    • /
    • 제9권3호
    • /
    • pp.191-200
    • /
    • 2022
  • These days, businesses, in both online and offline, have started accepting cryptocurrencies as payment methods. Even in countries like El Salvador, cryptocurrencies are recognized as fiat currencies. Meanwhile, publicly known, but not patched software vulnerabilities are security threats to not only software users but also to our society in general. As the status of cryptocurrencies has gradually increased, the impact of security vulnerabilities related to cryptocurrencies on our society has increased as well. In this paper, we first analyze vulnerabilities from the two major cryptocurrency vendors of Bitcoin and Ethereum in a quantitative manner with the respect to the CVSS, to see how the vulnerabilities are roughly structured in those systems. Then we introduce a modified AML vulnerability discovery model for the vulnerability datasets from the two vendors, after showing the original AML dose not accurately represent the vulnerability discovery trends on the datasets. The analysis shows that the modified model performs better than the original AML model for the vulnerability datasets from the major cryptocurrencies.

분석단계에서 취약점 관리의 보안 요건 정의에 관한 연구 (A Study on the Definition of Security Requirements of Vulnerability Management in Analysis Step)

  • 신성윤;이현창
    • 한국컴퓨터정보학회논문지
    • /
    • 제20권3호
    • /
    • pp.75-80
    • /
    • 2015
  • 취약점 관리란 보안 정책을 준수하여 사업의 연속성과 가용성을 보장하는 것이다. 본 논문에서는 시스템의 어플리케이션 및 IT 인프라에 대한 취약점 관리는 식별되어야 한다는 것이다. 그리고 개발 단계에서 실행 가능한 취약점 관리 방안이 도출되어야 한다는 것이다. 취약점의 식별 및 분류에서 식별 및 인증, 암호화, 접근제어의 영역에서 정의되지 않은 취약점들이 많다. 이들은 기술적, 관리적, 운영적 관점에서 해당 영역별로 누락 없이 정의하도록 한다. 식별된 취약점의 대응여부를 판단하고, 해당 취약점을 제거하기 위한 대응방안을 선택하도록 한다.

Vulnerability Assessment of a Large Sized Power System Using Neural Network Considering Various Feature Extraction Methods

  • Haidar, Ahmed M. A;Mohamed, Azah;Hussian, Aini
    • Journal of Electrical Engineering and Technology
    • /
    • 제3권2호
    • /
    • pp.167-176
    • /
    • 2008
  • Vulnerability assessment of power systems is important so as to determine their ability to continue to provide service in case of any unforeseen catastrophic contingency such as power system component failures, communication system failures, human operator error, and natural calamity. An approach towards the development of on-line power system vulnerability assessment is by means of using an artificial neural network(ANN), which is being used successfully in many areas of power systems because of its ability to handle the fusion of multiple sources of data and information. An important consideration when applying ANN in power system vulnerability assessment is the proper selection and dimension reduction of training features. This paper aims to investigate the effect of using various feature extraction methods on the performance of ANN as well as to evaluate and compare the efficiency of the proposed feature extraction method named as neural network weight extraction. For assessing vulnerability of power systems, a vulnerability index based on power system loss is used and considered as the ANN output. To illustrate the effectiveness of ANN considering various feature extraction methods for vulnerability assessment on a large sized power system, it is verified on the IEEE 300-bus test system.

Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering

  • Peng, Jianshan;Zhang, Mi;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권10호
    • /
    • pp.4933-4956
    • /
    • 2016
  • Use-After-Free (UAF) is a common lethal form of software vulnerability. By using tools such as Web Browser Fuzzing, a large amount of samples containing UAF vulnerabilities can be generated. To evaluate the threat level of vulnerability or to patch the vulnerabilities, automatic deduplication and exploitability determination should be carried out for these samples. There are some problems existing in current methods, including inadequate pertinence, lack of depth and precision of analysis, high time cost, and low accuracy. In this paper, in terms of key dangling pointer and crash context, we analyze four properties of similar samples of UAF vulnerability, explore the method of extracting and calculate clustering eigenvalues from these samples, perform clustering by fast search and find of density peaks on a large number of vulnerability samples. Samples were divided into different UAF vulnerability categories according to the clustering results, and the exploitability of these UAF vulnerabilities was determined by observing the shape of class cluster. Experimental results showed that the approach was applicable to the deduplication and exploitability determination of a large amount of UAF vulnerability samples, with high accuracy and low performance cost.

Climate Change Adaptive Implementation Assessment Proposal for Local Governments Utilizing Vulnerability Index

  • Lee, Sangsin
    • Journal of Forest and Environmental Science
    • /
    • 제35권1호
    • /
    • pp.47-53
    • /
    • 2019
  • This study applies the concept of climate change vulnerability assessment in order to suggest climate change adaptation effects in a quantitative manner, given that previous studies have hitherto rely on qualitative assessment, as climate change adaptive policies are currently being implemented by local governments of Korea. The vulnerability assessment tool used in this study is VESTAP ("Vulnerability assESsment Tool to build a climate change Adaptation Plan"), which was developed by the Korea Adaptation Center for Climate Change (KACCC), and applied to gauge the vulnerability of pine trees to diseases and pests within Chungcheongnam-do. The climate change adaptation project for vulnerability improvement was assessed only in terms of forest disaster prevention and change in regional climate change vulnerabilities within 16 regions of Chungcheongnam-do as the result of 2016 Climate Change Adaptation Project (Forest Disaster Prevention Project). As a result, it was observed that climate change adaptive capacity has improved according to change in the area of forestland with disaster prevention, and the vulnerability indicator decreased, confirming the impact of the climate change adaptation (forest disaster prevention) project. Also, analysis of regional climate change adaptation project scales and change in vulnerabilities allowed us to determine the regional propriety of climate change adaptation (forest disaster prevention) projects launched in 2016.

격자단위 분석기법을 적용한 도시 기후변화 재해취약성분석 (Grid Unit Based Analysis of Climate Change Driven Disaster Vulnerability in Urban Area)

  • 홍재주;임호종;함영한;이병재
    • Spatial Information Research
    • /
    • 제23권6호
    • /
    • pp.67-75
    • /
    • 2015
  • 오늘날 인간의 정주공간이 도시로 집중화되면서 도시 생활공간의 복잡화, 다양화, 고도화 되는 상황을 고려한 도시계획 관리기법의 개발이 요구되고 있는 실정이다. 특히, 대형화 다양화되고 있는 기후변화 재해에 효율적으로 대응하기 위해서는 도시의 재해 취약성에 대한 분석에 근거한 토지이용, 기반시설 등을 계획하는 도시계획이 필요하다. 이러한 관점에서 도입된 도시 기후변화 재해취약성 분석(UC-VAS)제도는 현재 집계구단위 분석방식으로 운영됨으로 도시계획활용을 위한 세부적인 구역검토가 어려운 실정이다. 이에 분석단위를 격자방식으로 변경하고 2개 지자체를 대상으로 분석하여 해당결과를 비교검토하였다. 분석결과 집계구 단위보다 세부적인 결과도출이 가능하며, 항공영상과의 현황비교결과 세부적인 구역설정이 가능한 결과를 마련할 수 있었다. 이와 같은 비교검토결과와 더불어 분석지표에 따라 격자단위 결과 활용에 문제점이 발생됨을 발견함으로써 향후 도시기후변화 재해취약성 분석제도의 과학성과 객관성을 추가 확보하는 전문적인 방안을 제시함으로써 제도운영의 효율성을 기대한다.

위협의 특성과 장갑의 방호 성능을 고려한 전투 시스템의 취약성 분석 방법 및 활용 : 고속정 모델을 대상으로 (A Method and Application of Vulnerability Analysis for Combat Systems Considering Threats and Defense Ability : Focused on PKM Model)

  • 황훈규;김배성;강지원;이장세
    • 한국정보통신학회논문지
    • /
    • 제20권8호
    • /
    • pp.1623-1631
    • /
    • 2016
  • 전투 시스템의 취약성을 분석하고 그 결과를 설계 단계에서 활용 및 반영하여 생존성의 향상을 목표로 하는 연구가 활발하게 진행되고 있다. 최근에는 모듈 단위로 독립적으로 진행되었던 여러 연구들을 통합하기 위한 방법의 연구에 대한 요구가 생겨나게 되었다. 이를 위해 본 논문에서는 선행 연구를 분석하고, 분석한 내용을 토대로 위협의 특성 및 장갑의 방호 성능을 고려한 전투 시스템의 통합 취약성 분석 방법을 제안한다. 또한 제안한 내용을 적용하여 기존의 피격 확률 분석 프로그램을 개선하고, 이를 통해 취약성 분석 결과를 고속정의 생존성 향상을 위해 활용할 수 있음을 시나리오 기반으로 검증하였다. 이를 통해 위협의 특성 및 장갑의 방호 성능까지도 고려하는 것으로 취약성 분석의 신뢰도를 향상시키는 것은 물론 동시에 통합 요구도 만족시킬 수 있다. 나아가 전투 시스템의 통합 취약성 분석 방법과 이를 적용한 시스템의 개발을 위한 연계 연구가 될 것으로 판단된다.

Fragility curves for the typical multi-span simply supported bridges in northern Pakistan

  • Waseem, Muhammad;Spacone, Enrico
    • Structural Engineering and Mechanics
    • /
    • 제64권2호
    • /
    • pp.213-223
    • /
    • 2017
  • Bridges are lifeline and integral components of transportation system that are susceptible to seismic actions, their vulnerability assessment is essential for seismic risk assessment and mitigation. The vulnerability assessment of bridges common in Pakistan is very important as it is seismically very active region and the available code for the seismic design of bridges is obsolete. This research presents seismic vulnerability assessment of three real case simply supported multi-span reinforced concrete bridges commonly found in northern Pakistan, having one, two and three bents with circular piers. The vulnerability assessment is carried through the non-linear dynamic time history analyses for the derivation of fragility curves. Finite element based numerical models of the bridges were developed in MIDAS CIVIL (2015) and analyzed through with non-linear dynamic and incremental dynamic analyses, using a suite of bridge-specific natural spectrum compatible ground motion records. Seismic responses of shear key, bearing pad, expansion joint and pier components of each bridges were recorded during analysis and retrieved for performance based analysis. Fragility curves were developed for the bearing pads, shear key, expansion joint and pier of the bridges that first reach ultimate limit state. Dynamic analysis and the derived fragility curves show that ultimate limit state of bearing pads, shear keys and expansion joints of the bridges exceed first, followed by the piers ultimate limit state for all the three bridges. Mean collapse capacities computed for all the components indicated that bearing pads, expansion joints, and shear keys exceed the ultimate limit state at lowest seismic intensities.