• 제목/요약/키워드: adversary system

검색결과 61건 처리시간 0.026초

The development of EASI-based multi-path analysis code for nuclear security system with variability extension

  • Andiwijayakusuma, Dinan;Setiadipura, Topan;Purqon, Acep;Su'ud, Zaki
    • Nuclear Engineering and Technology
    • /
    • 제54권10호
    • /
    • pp.3604-3613
    • /
    • 2022
  • The Physical Protection System (PPS) plays an important role and must effectively deal with various adversary attacks in nuclear security. In specific single adversary path scenarios, we can calculate the PPS effectiveness by EASI (Estimated Adversary Sequence Interruption) through Probability of Interruption (PI) calculation. EASI uses a single value of the probability of detection (PD) and the probability of alarm communications (PC) in the PPS. In this study, we develop a multi-path analysis code based on EASI to evaluate the effectiveness of PPS. Our quantification method for PI considers the variability and uncertainty of PD and PC value by Monte Carlo simulation. We converted the 2-D scheme of the nuclear facility into an Adversary Sequence Diagram (ASD). We used ASD to find the adversary path with the lowest probability of interruption as the most vulnerable paths (MVP). We examined a hypothetical facility (Hypothetical National Nuclear Research Facility - HNNRF) to confirm our code compared with EASI. The results show that implementing the variability extension can estimate the PI value and its associated uncertainty. The multi-path analysis code allows the analyst to make it easier to assess PPS with more extensive facilities with more complex adversary paths. However, the variability of the PD value in each protection element allows a significant decrease in the PI value. The possibility of this decrease needs to be an important concern for PPS designers to determine the PD value correctly or set a higher standard for PPS performance that remains reliable.

핵심 노드 선정을 위한 네트워크 기반 최적화 모델 (A Network-based Optimization Model for Effective Target Selection)

  • 이진호;이기현
    • 산업경영시스템학회지
    • /
    • 제46권4호
    • /
    • pp.53-62
    • /
    • 2023
  • Effects-Based Operations (EBO) refers to a process for achieving strategic goals by focusing on effects rather than attrition-based destruction. For a successful implementation of EBO, identifying key nodes in an adversary network is crucial in the process of EBO. In this study, we suggest a network-based approach that combines network centrality and optimization to select the most influential nodes. First, we analyze the adversary's network structure to identify the node influence using degree and betweenness centrality. Degree centrality refers to the extent of direct links of a node to other nodes, and betweenness centrality refers to the extent to which a node lies between the paths connecting other nodes of a network together. Based on the centrality results, we then suggest an optimization model in which we minimize the sum of the main effects of the adversary by identifying the most influential nodes under the dynamic nature of the adversary network structure. Our results show that key node identification based on our optimization model outperforms simple centrality-based node identification in terms of decreasing the entire network value. We expect that these results can provide insight not only to military field for selecting key targets, but also to other multidisciplinary areas in identifying key nodes when they are interacting to each other in a network.

Physical protection system vulnerability assessment of a small nuclear research reactor due to TNT-shaped charge impact on its reinforced concrete wall

  • Moo, Jee Hoon;Chirayath, Sunil S.;Cho, Sung Gook
    • Nuclear Engineering and Technology
    • /
    • 제54권6호
    • /
    • pp.2135-2146
    • /
    • 2022
  • A nuclear energy facility is one of the most critical facilities to be safely protected during and after operation because the physical destruction of its barriers by an external attack could release radioactivity into the environment and can cause harmful effects. The barrier walls of nuclear energy facilities should be sufficiently robust to protect essential facilities from external attack or sabotage. Physical protection system (PPS) vulnerability assessment of a typical small nuclear research reactor was carried out by simulating an external attack with a tri-nitro toluene (TNT) shaped charge and results are presented. The reinforced concrete (RC) barrier wall of the research reactor located at a distance of 50 m from a TNT-shaped charge was the target of external attack. For the purpose of the impact assessment of the RC barrier wall, a finite element method (FEM) is utilized to simulate the destruction condition. The study results showed that a hole-size of diameter 342 mm at the front side and 364 mm at the back side was created on the RC barrier wall as a result of a 143.35 kg TNT-shaped charge. This aperture would be large enough to let at least one person can pass through at a time. For the purpose of the PPS vulnerability assessment, an Estimate of Adversary Sequence Interruption (EASI) model was used, which enabled the determination of most vulnerable path to the target with a probability of interruption equal to 0.43. The study showed that the RC barrier wall is vulnerable to a TNT-shaped charge impact, which could in turn reduce the effectiveness of the PPS.

무선 센서 네트워크에서 동적 여과를 위한 퍼지 기반 확률 조절 기법 (Probability Adjustment Scheme for the Dynamic Filtering in Wireless Sensor Networks Using Fuzzy Logic)

  • 한만호;이해영;조대호
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2008년도 정보통신설비 학술대회
    • /
    • pp.159-162
    • /
    • 2008
  • Generally, sensor nodes can be easily compromised and seized by an adversary because sensor nodes are hostile environments after dissemination. An adversary may be various security attacks into the networks using compromised node. False data injection attack using compromised node, it may not only cause false alarms, but also the depletion of the severe amount of energy waste. Dynamic en-route scheme for Filtering False Data Injection (DEF) can detect and drop such forged report during the forwarding process. In this scheme, each forwarding nodes verify reports using a regular probability. In this paper, we propose verification probability adjustment scheme of forwarding nodes though a fuzzy rule-base system for the Dynamic en-route filtering scheme for Filtering False Data Injection in sensor networks. Verification probability determination of forwarding nodes use false traffic rate and distance form source to base station.

  • PDF

Instrumental Measurements of Hand Attributes on Microfiber Polyester/Cotton Blend Fabric Finished with Silicone Mixed Fluorochemical

  • Ahn, Young-Moo
    • 패션비즈니스
    • /
    • 제10권6호
    • /
    • pp.16-27
    • /
    • 2006
  • The purpose of this study was to examine the effects of chemical finishes on performance characteristics of microfiber blend fabrics. A 60% polyester microfiber /40% cotton blend woven fabric was finished by ten chemicals: three silicone softeners, one fluorochemical, and their mixtures. Performance characteristics examined were fabric hand attributes. Fabric hand was evaluated by instrumental measures using Kawabata KES-F system instruments. Silicone-only finishes did not change the bending properties significantly from those of the control fabric. The fluorochemical-only finish made the fabric stiffer and crisper. When the two chemicals were mixed they tended to offset this adversary effect. Most of the chemical finishes made the surface finer and smoother. Fluorochemical-only finish improved fabric strength. Likewise, dimethylpolysiloxane silicone improved fabric strength. Amino-functional hydrophilic and diamino-functional silicone softeners, on the other hand, reduced fabric strength. However, when mixed with the fluorochemical, the adversary effect was diminished.

XML기반 Windows Event Log Forensic 도구 설계 및 구현 (XML-based Windows Event Log Forensic tool design and implementation)

  • 김종민;이동휘
    • 융합보안논문지
    • /
    • 제20권5호
    • /
    • pp.27-32
    • /
    • 2020
  • Windows Event Log에는 시스템의 전반적인 동작들을 정의하고 있는 Log이며, 해당 파일에는 사용자의 여러 행위 및 이상 징후를 탐지할 수 있는 데이터가 저장되어 있다. 하지만 행위마다 Event Log가 발생함으로써, 로그들을 분석할 때, 상당한 시간이 소요된다. 따라서 본 연구에서는 NSA에서 발표한 "Spotting the Adversary with Windows Event Log Monitoring"의 주요 Event Log 목록을 바탕으로 XML 기반한 Event Log 분석 도구를 설계 및 구현 하였다.

안전한 전송을 위한 MRNS(Mixed Radix Number System)네트워크에서의 비밀 다중 경로의 설계 (The Design of Secret Multi-Paths on MRNS(Mixed Radix Numbers System) Network for Secure Transmission)

  • 김성열;정일용
    • 한국정보처리학회논문지
    • /
    • 제3권6호
    • /
    • pp.1534-1541
    • /
    • 1996
  • 경로 보안은 데이타의 전송을 위해 선택된 경로의 비밀성에 관한 것이다. 만일 경로의 일부분이라도 알려진다면 이 경로를 통해 전달된 데이타가 유출될 확률은 크 다. 이런 이유때문에 데이타의 전송경로는 보호되어야 하며 이를 위해 우리는 한 개 의 중간노드를 비밀리 선택하여 기존의 최단 거리를 이용하여 데이타를 전송하는 방 법을 선택하지 않고 이 중간 노드를 이용하여 데이타를 전송한다. 더 나아가 우리가 여러 개의 비밀경로를 이용한다면 한 개의 경로에 모든 데이타를 보내는 대신에 각 경로에 partial 데이타를 보낼 수 있기 때문에 데이타의 보안은 좀 더 강해진다. 이 러한 아이디어를 실현하기 위해 데이타는 정보분산 방법을 이용하여 여러개의 partial 데이타로 나누어진다. 본 논문에서는 위에서 제시한 아이디어를 네트워크상 에서 구현한다.

  • PDF

제어시스템의 내부자 위협 탐지를 위한 Event Log 타당성 및 중요도 분석에 관한 연구 (A Study on the Analysis of Validity and Importance of Event Log for the Detection of Insider Threats to Control System)

  • 김종민;김동민;이동휘
    • 융합보안논문지
    • /
    • 제18권3호
    • /
    • pp.77-85
    • /
    • 2018
  • 제어시스템은 공공 네트워크와의 통신망 융합에 따라 다양한 루트를 통해 정보유출 및 변조 등의 위협이 제어시스템에서도 그대로 나타날 수 있다. 최근 다양한 보안에 대한 이슈와 새로운 공격기법에 의한 침해 사례가 다변화됨에 따라서, 단순히 차단 및 확인 등의 학습을 통해 정보를 데이터베이스화하는 보안 시스템으로는 새로운 형태의 위협에는 대처하기 힘들어지고 있다. 현재 제어시스템에서는 이처럼 외부에서 내부로의 위협에 치중하여 보안 시스템을 운용하고 있으며, 보안 접근 권한을 가진 내부자에 의한 보안위협 탐지에 대해서는 미비한 실정이다. 이에 따라 본 연구에서는 NSA에서 발표한 "Spotting the Adversary with Windows Event Log Monitoring"의 주요 Event Log 목록을 토대로 중요도 분석을 실시하였다. 그 결과 제어시스템에 내부자 위협탐지를 위한 Event Log의 중요도 여부를 알 수 있었으며, 분석결과를 바탕으로 이 분야의 연구에 기여할 수 있을 것으로 판단된다.

  • PDF

소프트웨어 공격에 대한 보안성 분석 (Analyses of Security for Software Attack)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2007년도 추계종합학술대회
    • /
    • pp.725-728
    • /
    • 2007
  • Software security is about making software behave correctly in the presence of a malicious attack, even though software failures usually happen spontaneously in the real world. Standard software testing literature is concerned only with what happens when software fails, regardless of intent. The difference between software safety and software security is therefor the presence of an intelligent adversary bent on breaking the system. Software security for attacking the system is presented in this paper

  • PDF

정확성을 보장하는 결정적 Private Matching (Deterministic Private Matching with Perfect Correctness)

  • 홍정대;김진일;천정희;박근수
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제34권10호
    • /
    • pp.502-510
    • /
    • 2007
  • Private Matching은 각기 다른 두 참여자가 가진 데이타의 교집합을 구하는 문제이다. Private matching은 보험사기 방지시스템, 항공기 탑승 금지자 목록 검색, 의료 정보 검색 등에 이용될 수 있으며 다자간의 계산으로 확장하면 전자투표, 온라인 게임 등에도 이용될 수 있다. 2004년 Freedman 등 [1]은 이 문제를 확률적으로 해결하는 프로토콜을 제안하고 악의적인 공격자 모델과 다자간 계산으로 확장하였다. 이 논문에서는 기존의 프로토콜을 결정적(deterministic) 방법으로 개선하여 Semi-Honest 모델에서 결과의 정확성을 보장하는 한편, 이를 악의적인 공격자 모델에 확장하여 신뢰도와 연산속도를 향상 시키는 새로운 프로토콜을 제안한다.