• Title/Summary/Keyword: system vulnerability

Search Result 982, Processing Time 0.03 seconds

Vulnerability Assessment of a Large Sized Power System Using Neural Network Considering Various Feature Extraction Methods

  • Haidar, Ahmed M. A;Mohamed, Azah;Hussian, Aini
    • Journal of Electrical Engineering and Technology
    • /
    • v.3 no.2
    • /
    • pp.167-176
    • /
    • 2008
  • Vulnerability assessment of power systems is important so as to determine their ability to continue to provide service in case of any unforeseen catastrophic contingency such as power system component failures, communication system failures, human operator error, and natural calamity. An approach towards the development of on-line power system vulnerability assessment is by means of using an artificial neural network(ANN), which is being used successfully in many areas of power systems because of its ability to handle the fusion of multiple sources of data and information. An important consideration when applying ANN in power system vulnerability assessment is the proper selection and dimension reduction of training features. This paper aims to investigate the effect of using various feature extraction methods on the performance of ANN as well as to evaluate and compare the efficiency of the proposed feature extraction method named as neural network weight extraction. For assessing vulnerability of power systems, a vulnerability index based on power system loss is used and considered as the ANN output. To illustrate the effectiveness of ANN considering various feature extraction methods for vulnerability assessment on a large sized power system, it is verified on the IEEE 300-bus test system.

An Efficient Agent Framework for Host-based Vulnerability Assessment System in Virtualization Environment (가상화 환경에서 호스트 기반 취약점 분석 시스템을 위한 효율적인 에이전트 프레임워크)

  • Yang, Jin-Seok;Chung, Tai-Myoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.1
    • /
    • pp.23-30
    • /
    • 2014
  • In this paper, we propose an efficient agent framework for host-based vulnerability assessment system by analyzing the operational concept of traditional vulnerability assessment framework and proposed vulnerability assessment agent framework in virtualization environment. A proposed agent framework have concept by using the features of virtualization technology, it copy and execute checking agent in targeted virtual machines. In order to embody a propose agent framework, we design function block of checking agent and describe a vulnerability checking scenario of proposed agent framework. Also we develop pilot system for vulnerability checking scenario. We improve the shortcomings of the traditional vulnerability assessment system, such as unnecessary system load of the agent, inefficiency due to duplication agent installation. Moreover, the proposed agent framework is maximizing the scalability of the system because there is no agent installation when adding a targeted system.

The Plan and Tools for Vulnerability Testing in Information Software-Based System

  • Kim, In-Jung;Lee, Young-Gyo;Won, Dong-Ho
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.75-78
    • /
    • 2005
  • Although many tests for stabilization of the software have been done, vulnerability test for a system run by combination of the software of various products has not been conducted enough. This has led to increased threats and vulnerability of system. Especially, web-based software system, which is public, has inherent possibility of exposure to attacks and is likely to be seriously damaged by an accident. Consequently, comprehensive and systematic test plans and techniques are required. Moreover, it is necessary to establish a procedure for managing and handling the results of vulnerability test. This paper proposes vulnerability test plans and designs for implementing automated tools, both of which can be complied with on web-based software systems.

Health Vulnerability Assessment for PM10 in Busan (부산지역 미세먼지에 대한 건강 취약성 평가)

  • Lee, Won-Jung;Hwang, Mi-Kyoung;Kim, Yoo-Keun
    • Journal of Environmental Health Sciences
    • /
    • v.40 no.5
    • /
    • pp.355-366
    • /
    • 2014
  • Objectives: This study seeks to evaluate the vulnerability assessment of the human health sector for $PM_{10}$, which is reflected in the regional characteristics and related disease mortality rates for $PM_{10}$ in Busan over the period of 2006-2010. Methods: According to the vulnerability concept suggested by the Intergovernmental Panel on Climate Change (IPCC), vulnerability to $PM_{10}$ is comprised of the categories of exposure, sensitivity, and adaptive capacity. The indexes of the exposure and sensitivity categories indicate positive effects, while the adaptive capacity index indicates a negative effect on vulnerability to $PM_{10}$. Variables of each category were standardized by the rescaling method, and each regional relative vulnerability was computed through the vulnerability index calculation formula. Results: The regions with a high exposure index are Jung-Gu (transportation region) and Saha-Gu (industrial region). Major factors determining the exposure index are the $PM_{10}$ concentration, days of $PM_{10}{\geq}50$, ${\mu}g/m^3$, and $PM_{10}$ emissions. The regions that show a high sensitivity index are urban and rural regions; these commonly have a high mortality rate for related disease and vulnerable populations. The regions that have a high adaptive capacity index are Jung-Gu, Gangseo-Gu, and Busanjin-Gu, all of which have a high level of economic/welfare/health care factors. The high-vulnerability synthesis of the exposure, sensitivity, and adaptive capacity indexes show that Dong-Gu and Seo-Gu have a risk for $PM_{10}$ potential effects and a low adaptive capacity. Conclusions: This study presents the vulnerability index to $PM_{10}$ through a relative comparison using quantitative evaluation to draw regional priorities. Therefore, it provides basic data to reflect environmental health influences in favor of an adaptive policy limiting damage to human health caused by vulnerability to $PM_{10}$.

Extended Linear Vulnerability Discovery Process

  • Joh, HyunChul
    • Journal of Multimedia Information System
    • /
    • v.4 no.2
    • /
    • pp.57-64
    • /
    • 2017
  • Numerous software vulnerabilities have been found in the popular operating systems. And recently, robust linear behaviors in software vulnerability discovery process have been noticeably observed among the many popular systems having multi-versions released. Software users need to estimate how much their software systems are risk enough so that they need to take an action before it is too late. Security vulnerabilities are discovered throughout the life of a software system by both the developers, and normal end-users. So far there have been several vulnerability discovery models are proposed to describe the vulnerability discovery pattern for determining readiness for patch release, optimal resource allocations or evaluating the risk of vulnerability exploitation. Here, we apply a linear vulnerability discovery model into Windows operating systems to see the linear discovery trends currently observed often. The applicability of the observation form the paper show that linear discovery model fits very well with aggregate version rather than each version.

Calculation of the Area of Vulnerability to Voltage Sags by using Impedance Building Algorithm (임피던스 행렬 구성법을 이용한 순간전압강하 취약지역의 계산)

  • Park, Jong-Il;Park, Chang-Hyun
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.26 no.1
    • /
    • pp.44-53
    • /
    • 2012
  • This paper presents a method to calculate the area of vulnerability by using the impedance building algorithm. The installation of DG (Distributed Generation) is one of the countermeasures against voltage sags in power systems. In order to estimate the effect of the DG, the voltage sag assessment should be performed based on the area of vulnerability and system fault statistics. To determine the area of vulnerability, system impedance matrix should be calculated. The calculation of the impedance matrix of large systems is time-consuming task. This paper addresses an effective scheme to calculate the area of vulnerability and system impedance matrix.

The Impact of Environmental Health Factors on Extreme-heat Vulnerability Assessment in a Metropolitan City (환경보건적 요소가 도시 내 폭염 취약성 평가 결과에 미치는 영향 분석)

  • Lee, Won-Jung;Kang, Jae-Eun;Kim, Yoo-Keun
    • Journal of Environmental Health Sciences
    • /
    • v.39 no.6
    • /
    • pp.492-504
    • /
    • 2013
  • Objectives: This analysis seeks to evaluate the impact of environmental health factors (EHF; e.g. hospital beds per capita, employees of medical institutions) on extreme-heat vulnerability assessment in Busan Metropolitan City during 2006-2010. Methods: According to the vulnerability concept suggested by the Intergovernmental Panel on Climate Change (IPCC), extreme-heat vulnerability is comprised of the categories of Exposure, Sensitivity, and Adaptive Capacity (including EHF). The indexes of the Exposure and Sensitivity categories indicate positive effects, while the Adaptive capacity index indicates a negative effect on extreme-heat vulnerability. Variables of each category were standardized by the re-scaling method, and then each regional relative vulnerability was computed with the vulnerability index calculation formula. Results: The extreme-heat vulnerability index (EVI) excepting EHF was much higher in urban areas than in suburban areas within the metropolitan area. When EHF was considered, the difference in the EVI between the two areas was reduced due to the increase of the Adaptive capacity index in urban areas. The low EVI in suburban areas was induced by a dominant effect of natural environmental factors (e.g. green area) within the Adaptive capacity category. Conclusions: To reduce the vulnerability to extreme heat in urban areas, which were more frequently exposed to extreme heat than others areas, public health and natural environments need to be improved in sensitive areas.

Development of Meteorologic Data Retrieval Program for Vulnerability Assessment to Natural Hazards (재해 취약성 평가를 위한 기상자료 처리 프로그램 MetSystem 개발)

  • Jang, Min-Won;Kim, Sang-Min
    • Journal of Korean Society of Rural Planning
    • /
    • v.19 no.4
    • /
    • pp.47-54
    • /
    • 2013
  • Climate change is the most direct threatening factors in sustaining agricultural productivity. It is necessary to reduce the damages from the natural hazards such as flood, drought, typhoons, and snowstorms caused by climate change. Through the vulnerability assessment to adapt the climate change, it is possible to analyze the priority, feasibility, effect of the reduction policy. For the vulnerability assessment, broad amount of weather data for each meterological station are required. Making the database management system for the meteorologic data could troubleshoot of the difficulties lie in handling and processing the weather data. In this study, we generated the meteorologic data retrieval system (MetSystem) for climate change vulnerability assessment. The user interface of MetSystem was implemented in the web-browser so as to access to a database server at any time and place, and it provides different query executions according to the criteria of meteorologic stations, temporal range, meteorologic items, statistics, and range of values, as well as the function of exporting to Excel format (*.xls). The developed system is expected that it will make it easier to try different analyses of vulnerability to natural hazards by the simple access to meteorologic database and the extensive search functions.

Cyber Attack and Defense Modeling Using Vulnerability Metrics (취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링)

  • 이장세;지승도
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.06a
    • /
    • pp.191-198
    • /
    • 2003
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (ⅰ) it is able to analyze behaviors of system emerged by interaction with functional elements of components composing network and each other, (ⅱ) it is able to analyze vulnerability in quantitative manner, and (ⅲ) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF

VULNERABILITY ASSESSMENTS AND RISK MANAGEMENT FOR CRITICAL INFRASTRUCTURES FROM HOMELAND SECURITY VIEWPOINTS

  • Chun Nen Huang;Yao-Chen Kuo
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.292-301
    • /
    • 2009
  • The employment of risk management theory in Urban Disaster Management System (UDMS) has become an important trend in recent years. The viewpoint of risk management is mainly a comprehensive risk assessment of various internal and external factors, and a subsequent handling of risks. Through continuous and systematic accumulation and analysis of risk information, disaster prevention and rescue system is established. Taking risk management theory as the foundation, Organization for Economic Cooperation and Development (OECD) has developed a series of UDMS in the mega-cities all over the world. With this system as a common platform, OECD cooperates with different cities to develop disaster prevention and rescue system consisting of vulnerability assessment methods, risk assessment and countermeasures. The paper refers to the urban disaster vulnerability assessment and risk management of OECD and the mega-cities of different advanced and developed countries in the world, and then constructs a preliminarily drafted structure for the vulnerability assessment methods and risk management mechanism in the metropolitan districts of Taiwan.

  • PDF