• Title/Summary/Keyword: policy anomalies

Search Result 9, Processing Time 0.02 seconds

Classifying Rules by In-out Traffic Direction to Avoid Security Policy Anomaly

  • Kim, Sung-Hyun;Lee, Hee-Jo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.4
    • /
    • pp.671-690
    • /
    • 2010
  • The continuous growth of attacks in the Internet causes to generate a number of rules in security devices such as Intrusion Prevention Systems, firewalls, etc. Policy anomalies in security devices create security holes and prevent the system from determining quickly whether allow or deny a packet. Policy anomalies exist among the rules in multiple security devices as well as in a single security device. The solution for policy anomalies requires complex and complicated algorithms. In this paper, we propose a new method to remove policy anomalies in a single security device and avoid policy anomalies among the rules in distributed security devices. The proposed method classifies rules according to traffic direction and checks policy anomalies in each device. It is unnecessary to compare the rules for outgoing traffic with the rules for incoming traffic. Therefore, classifying rules by in-out traffic, the proposed method can reduce the number of rules to be compared up to a half. Instead of detecting policy anomalies in distributed security devices, one adopts the rules from others for avoiding anomaly. After removing policy anomalies in each device, other firewalls can keep the policy consistency without anomalies by adopting the rules of a trusted firewall. In addition, it blocks unnecessary traffic because a source side sends as much traffic as the destination side accepts. Also we explain another policy anomaly which can be found under a connection-oriented communication protocol.

A Study on the Structure and Origin of the Dokdo and it's Surroundings in the East Sea (Japan Sea) Using Magnetic Anomalies (지자기이상을 이용한 동해 독도 및 독도주변의 구조와 성인에 관한 고찰)

  • Kim, Chang-Hwan;Park, Chan-Hong;Min, Kyung-Duck;Han, Hyun-Chul;Kwon, Moon-Sang;Shim, Jae-Seol;Choi, Sung-Ho;Oh, Soon-Bock
    • Ocean and Polar Research
    • /
    • v.24 no.4
    • /
    • pp.491-500
    • /
    • 2002
  • Magnetic anomalies in the Dokdo and it's surroundings were investigated with respect to structure and origin of the Dokdo and surrounding seamounts. After normal and diurnal correction of measured magnetic data, crossover correction was applied to reduce errors between sets of magnetic anomalies. The errors from crossover operation result in decrease of about 51%, from 62.2 nT to 30.1 nT in standard deviation. Reduction-to-the-pole, second vertical derivative and analytic signal processing were applied to explore magnetic anomaly signatures in detail. Magnetic anomalies are most complicated in the 1st-Dok seamount, show SWW-NEE linear pattern in the 2nd-Dok seamount and lower to the 3rd-Dok seamount. Different magnetic anomaly patterns in three seamounts imply that three volcanic seamounts were formed at different times and are composed of rocks that were produced in different conditions. It seems that the 3rd-Dok seamount was first to form and followed by the 1st-Dok seamount. The complicated magnetic and second vertical derivative anomaly patterns in the 1st-Dok seamount may be due to subsidiary cones around crater or the presence of intruded magma bodies below sea surface and the Dokdo is probably a marginal subsidiary part of crater.

An Analysis of Effectiveness of Economic Sanctions and Inducements and Implications for Policies towards North Korea Based on Theoretical Applications from Prospect Theory (경제제재와 경제지원의 효과 분석 및 대북정책에 대한 시사점: 전망이론적 논의)

  • Park, Ji-Youn;Jo, Dongho
    • KDI Journal of Economic Policy
    • /
    • v.35 no.1
    • /
    • pp.1-32
    • /
    • 2013
  • Economic sanctions and inducements are types of 'policy instruments' based on 'economic tools' to influence other international actors. Ongoing debates on sanctions and inducements have exposed drawbacks for relying on individual case studies. There are some studies in the literature that attempt theoretical analysis of sanctions and inducements, but they are mostly based on rational choice theory. In reality, however, there exist so many cases that cannot be explained by rational choice theory. These are called anomalies or exceptions. The literature introduces specific variables to interpret these anomalies and thus sacrifice the universality of the theory. From this point of view, prospect theory would present an effective tool to analyze economic sanctions and inducements. It is a behavioral economic theory that tries to model a decisions making process in reality. The theory says that people make decisions based on subjective value of losses and gains from an individual reference point, and that people evaluate these losses and gains using heuristics. Thus prospect theory could offer a different frame which has greater explanatory range without adding new variables. As a result of this study, target's losses of 'back down' towards economic sanctions loom larger when the reference point level increases, therefore, the effectiveness of sanctions decreases. However, target's losses of 'stand firm' towards economic inducements loom larger under the same condition of reference point, therefore, the effectiveness of inducements increases. The findings of the paper suggest meaningful implications to the economic policy towards North Korea.

  • PDF

Relationship Between Korean Monthly Temperature During Summer and Eurasian Snow Cover During Spring (우리나라 여름철 월별 기온 변동성과 유라시아 봄철 눈덮임 간의 상관성 분석)

  • Won, You Jin;Yeh, Sang-Wook;Yim, Bo Young;Kim, Hyun-Kyung
    • Atmosphere
    • /
    • v.27 no.1
    • /
    • pp.55-65
    • /
    • 2017
  • This study investigates how Eurasian snow cover in spring (March and April) is associated with Korean temperature during summer (June-July-August). Two leading modes of Eurasian snow cover variability in spring for 1979~2015 are obtained by Empirical Orthogonal Function (EOF) analysis. The first EOF mode of Eurasian snow cover is characterized by a zonally elongated pattern over the whole Eurasian region and its principal component is more correlated with Korean temperature during June. On the other hand, the second EOF mode of Eurasian snow cover is characterized by an east-west dipole-like pattern, showing positive anomalies over eastern Eurasian region and negative anomalies over western Eurasian region. This dipole-like pattern is related with Korean temperature during August. The first leading mode of Eurasian snow cover is associated with anomalous high (low) pressure over Korea (Sea of Okhotsk) during June, which might be induced by much evaporation of soil moisture in Eurasia during March. On the other hand, the second mode of Eurasian snow cover is associated with a wave train resembling with Eurasian (EU)-like pattern in relation to the Atlantic sea surface temperature forcing, leading to the anomalous high pressure over Korea during August. Understanding these two leading modes of snow cover in Eurasian continent in spring may contribute to predict Korean summer temperature.

A Study to Hierarchical Visualization of Firewall Access Control Policies (방화벽 접근정책의 계층적 가시화 방법에 대한 연구)

  • Kim, Tae-yong;Kwon, Tae-woong;Lee, Jun;Lee, Youn-su;Song, Jung-suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1087-1101
    • /
    • 2020
  • Various security devices are used to protect internal networks and valuable information from rapidly evolving cyber attacks. Firewall, which is the most commonly used security device, tries to prevent malicious attacks based on a text-based filtering rule (i.e., access control policy), by allowing or blocking access to communicate between inside and outside environments. However, in order to protect a valuable internal network from large networks, it has no choice but to increase the number of access control policy. Moreover, the text-based policy requires time-consuming and labor cost to analyze various types of vulnerabilities in firewall. To solve these problems, this paper proposes a 3D-based hierarchical visualization method, for intuitive analysis and management of access control policy. In particular, by providing a drill-down user interface through hierarchical architecture, Can support the access policy analysis for not only comprehensive understanding of large-scale networks, but also sophisticated investigation of anomalies. Finally, we implement the proposed system architecture's to verify the practicality and validity of the hierarchical visualization methodology, and then attempt to identify the applicability of firewall data analysis in the real-world network environment.

Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information) (PC보안솔루션 로그분석을 통한 보안정책 제안 (개인정보유출 방지))

  • Chae, Hyun Tak;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.961-968
    • /
    • 2014
  • In order to prevent leakage of personal information by insiders a large number of companies install pc security solutions like DRM(Digital Right Management), DLP(Data Loss Prevention), Personal information filtering software steadily. However, despite these investments anomalies personal information occurred. To establish proper security policy before implementing pc security solutions, companies can prevent personal information leakage. Furthermore by analyzing the log from the solutions, companies verify the policies implemented effectively and modify security policies. In this paper, we define the required security solutions installed on PC to prevent disclosure of personal information in a variety of PC security solution, plan to integrate operations of the solutions in the blocking personal information leakage point of view and propose security policies through PC security solution log analysis.

Eliminating Request Starvation due to Expectation Discrepancy between NCQ and I/O Scheduler (NCQ와 입출력 스케줄러의 기대 불일치로 인한 입출력 요청의 굶주림 현상 제거)

  • Yu, Young-Jin;Shin, Dong-In;Jung, Im-Young;Yeom, Heon-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.5
    • /
    • pp.400-404
    • /
    • 2009
  • Native Command Queueing is a technology to maximize throughput of disk system by reordering requests in its command queue. Recent S-ATA 2 standard specifies a protocol for the purpose of dealing with NCQ feature, making most vendors implementing it in their disk devices. However, the new feature, NCQ, may lead to information gap between OS and disk drive. 05 considers that disk will service I/O requests in the order as OS has dispatched. Unfortunately, it isn't true any more since NCQ would simply ignore the policy of OS and reorder the sequence OS has expected. Let us define the term as expectation-discord. Due to the discord, serious performance anomalies or starvation of requests may occur in I/O subsystem. In this paper, we confirm that the expectation-discord actually brings about starvation of requests. We propose a solution to settle it. Our solution is very simple, effective, cheap(not requiring any hardware modification) and portable across various OS. Experimental results show that our solution can balance throughput and response time very well.

A Maximum Power Demand Prediction Method by Average Filter Combination (평균필터 조합을 통한 최대수요전력 예측기법)

  • Yu, Chan-Jik;Kim, Jae-Sung;Roh, Kyung-Woo;Cho, Wan-Sup
    • The Journal of Bigdata
    • /
    • v.5 no.1
    • /
    • pp.227-239
    • /
    • 2020
  • This paper introduces a method for predicting the maximum power demand despite communication errors in industrial sites. Due to the recent policy of de-nuclearization in Korea, the price of electricity is inevitable, and the amount of electricity used and maximum load management for the management of power demand are becoming important issues. Accordingly, it is important to predict and manage peak power. However, problems such as loss and modulation of measured power data occur at industrial sites due to noise generated by various facilities and sensors. It is difficult to predict the exact value when measured effective power data are lost. The study presents a model for predicting and correcting anomalies and missing values when measured effective power data are lost. The models used in this study are expected to be useful in predicting peak power demand in the event of communication errors at industrial sites.

A Study of Weather App Based on Behavioral Economics (행동경제학 관점에서 날씨 어플리케이션 연구)

  • Yoon, Ji-Yeon;Kim, Bo-Yeun
    • Journal of Digital Convergence
    • /
    • v.17 no.4
    • /
    • pp.249-254
    • /
    • 2019
  • As an alternative to the growing problem of weather anomalies, users are using mobile weather apps to predict the weather. Even though it provides clear information, the user makes mistakes in forecasting the weather. For this reason, The purpose of this study is to find elements that can be prepared for the volatile weather through mobile application. Jakob Nielsen's "heuristic" evaluation found weaknesses in the application. Then I proceeded to analyze it from a behavioral economics standpoint. As a result, the two applications had various functions and accurate information. However, user accessibility was low and focused on 'information delivery'.