• 제목/요약/키워드: system vulnerability

검색결과 982건 처리시간 0.027초

Vulnerability Assessment of a Large Sized Power System Using Neural Network Considering Various Feature Extraction Methods

  • Haidar, Ahmed M. A;Mohamed, Azah;Hussian, Aini
    • Journal of Electrical Engineering and Technology
    • /
    • 제3권2호
    • /
    • pp.167-176
    • /
    • 2008
  • Vulnerability assessment of power systems is important so as to determine their ability to continue to provide service in case of any unforeseen catastrophic contingency such as power system component failures, communication system failures, human operator error, and natural calamity. An approach towards the development of on-line power system vulnerability assessment is by means of using an artificial neural network(ANN), which is being used successfully in many areas of power systems because of its ability to handle the fusion of multiple sources of data and information. An important consideration when applying ANN in power system vulnerability assessment is the proper selection and dimension reduction of training features. This paper aims to investigate the effect of using various feature extraction methods on the performance of ANN as well as to evaluate and compare the efficiency of the proposed feature extraction method named as neural network weight extraction. For assessing vulnerability of power systems, a vulnerability index based on power system loss is used and considered as the ANN output. To illustrate the effectiveness of ANN considering various feature extraction methods for vulnerability assessment on a large sized power system, it is verified on the IEEE 300-bus test system.

가상화 환경에서 호스트 기반 취약점 분석 시스템을 위한 효율적인 에이전트 프레임워크 (An Efficient Agent Framework for Host-based Vulnerability Assessment System in Virtualization Environment)

  • 양진석;정태명
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제3권1호
    • /
    • pp.23-30
    • /
    • 2014
  • 본 논문에서는 가상화 환경에서 호스트 기반 취약점 분석 시스템의 에이전트 프레임워크를 제안한다. 기존 호스트 기반 취약점은 점검 대상 시스템에 에이전트를 반드시 설치하여 운용해야만 했지만 제안한 에이전트 프레임워크는 점검 대상 가상머신에 에이전트를 복사 및 실행하는 개념을 가진다. 본 논문에서는 가상화 환경에서 호스트 기반 취약점 분석 시스템 에이전트 프레임워크를 수립하였으며 점검 시나리오를 기술하고 해당 시나리오에 대한 파일럿 시스템을 개발하였다. 제안하는 에이전트 프레임워크는 점검 대상 시스템 추가 시에도 에이전트의 추가 설치가 없어 시스템 확장성을 극대화하였으며 에이전트의 불필요한 자원 낭비 등 기존 시스템의 단점을 개선하였다.

The Plan and Tools for Vulnerability Testing in Information Software-Based System

  • Kim, In-Jung;Lee, Young-Gyo;Won, Dong-Ho
    • Journal of Information Processing Systems
    • /
    • 제1권1호
    • /
    • pp.75-78
    • /
    • 2005
  • Although many tests for stabilization of the software have been done, vulnerability test for a system run by combination of the software of various products has not been conducted enough. This has led to increased threats and vulnerability of system. Especially, web-based software system, which is public, has inherent possibility of exposure to attacks and is likely to be seriously damaged by an accident. Consequently, comprehensive and systematic test plans and techniques are required. Moreover, it is necessary to establish a procedure for managing and handling the results of vulnerability test. This paper proposes vulnerability test plans and designs for implementing automated tools, both of which can be complied with on web-based software systems.

부산지역 미세먼지에 대한 건강 취약성 평가 (Health Vulnerability Assessment for PM10 in Busan)

  • 이원정;황미경;김유근
    • 한국환경보건학회지
    • /
    • 제40권5호
    • /
    • pp.355-366
    • /
    • 2014
  • Objectives: This study seeks to evaluate the vulnerability assessment of the human health sector for $PM_{10}$, which is reflected in the regional characteristics and related disease mortality rates for $PM_{10}$ in Busan over the period of 2006-2010. Methods: According to the vulnerability concept suggested by the Intergovernmental Panel on Climate Change (IPCC), vulnerability to $PM_{10}$ is comprised of the categories of exposure, sensitivity, and adaptive capacity. The indexes of the exposure and sensitivity categories indicate positive effects, while the adaptive capacity index indicates a negative effect on vulnerability to $PM_{10}$. Variables of each category were standardized by the rescaling method, and each regional relative vulnerability was computed through the vulnerability index calculation formula. Results: The regions with a high exposure index are Jung-Gu (transportation region) and Saha-Gu (industrial region). Major factors determining the exposure index are the $PM_{10}$ concentration, days of $PM_{10}{\geq}50$, ${\mu}g/m^3$, and $PM_{10}$ emissions. The regions that show a high sensitivity index are urban and rural regions; these commonly have a high mortality rate for related disease and vulnerable populations. The regions that have a high adaptive capacity index are Jung-Gu, Gangseo-Gu, and Busanjin-Gu, all of which have a high level of economic/welfare/health care factors. The high-vulnerability synthesis of the exposure, sensitivity, and adaptive capacity indexes show that Dong-Gu and Seo-Gu have a risk for $PM_{10}$ potential effects and a low adaptive capacity. Conclusions: This study presents the vulnerability index to $PM_{10}$ through a relative comparison using quantitative evaluation to draw regional priorities. Therefore, it provides basic data to reflect environmental health influences in favor of an adaptive policy limiting damage to human health caused by vulnerability to $PM_{10}$.

Extended Linear Vulnerability Discovery Process

  • Joh, HyunChul
    • Journal of Multimedia Information System
    • /
    • 제4권2호
    • /
    • pp.57-64
    • /
    • 2017
  • Numerous software vulnerabilities have been found in the popular operating systems. And recently, robust linear behaviors in software vulnerability discovery process have been noticeably observed among the many popular systems having multi-versions released. Software users need to estimate how much their software systems are risk enough so that they need to take an action before it is too late. Security vulnerabilities are discovered throughout the life of a software system by both the developers, and normal end-users. So far there have been several vulnerability discovery models are proposed to describe the vulnerability discovery pattern for determining readiness for patch release, optimal resource allocations or evaluating the risk of vulnerability exploitation. Here, we apply a linear vulnerability discovery model into Windows operating systems to see the linear discovery trends currently observed often. The applicability of the observation form the paper show that linear discovery model fits very well with aggregate version rather than each version.

임피던스 행렬 구성법을 이용한 순간전압강하 취약지역의 계산 (Calculation of the Area of Vulnerability to Voltage Sags by using Impedance Building Algorithm)

  • 박종일;박창현
    • 조명전기설비학회논문지
    • /
    • 제26권1호
    • /
    • pp.44-53
    • /
    • 2012
  • This paper presents a method to calculate the area of vulnerability by using the impedance building algorithm. The installation of DG (Distributed Generation) is one of the countermeasures against voltage sags in power systems. In order to estimate the effect of the DG, the voltage sag assessment should be performed based on the area of vulnerability and system fault statistics. To determine the area of vulnerability, system impedance matrix should be calculated. The calculation of the impedance matrix of large systems is time-consuming task. This paper addresses an effective scheme to calculate the area of vulnerability and system impedance matrix.

환경보건적 요소가 도시 내 폭염 취약성 평가 결과에 미치는 영향 분석 (The Impact of Environmental Health Factors on Extreme-heat Vulnerability Assessment in a Metropolitan City)

  • 이원정;강재은;김유근
    • 한국환경보건학회지
    • /
    • 제39권6호
    • /
    • pp.492-504
    • /
    • 2013
  • Objectives: This analysis seeks to evaluate the impact of environmental health factors (EHF; e.g. hospital beds per capita, employees of medical institutions) on extreme-heat vulnerability assessment in Busan Metropolitan City during 2006-2010. Methods: According to the vulnerability concept suggested by the Intergovernmental Panel on Climate Change (IPCC), extreme-heat vulnerability is comprised of the categories of Exposure, Sensitivity, and Adaptive Capacity (including EHF). The indexes of the Exposure and Sensitivity categories indicate positive effects, while the Adaptive capacity index indicates a negative effect on extreme-heat vulnerability. Variables of each category were standardized by the re-scaling method, and then each regional relative vulnerability was computed with the vulnerability index calculation formula. Results: The extreme-heat vulnerability index (EVI) excepting EHF was much higher in urban areas than in suburban areas within the metropolitan area. When EHF was considered, the difference in the EVI between the two areas was reduced due to the increase of the Adaptive capacity index in urban areas. The low EVI in suburban areas was induced by a dominant effect of natural environmental factors (e.g. green area) within the Adaptive capacity category. Conclusions: To reduce the vulnerability to extreme heat in urban areas, which were more frequently exposed to extreme heat than others areas, public health and natural environments need to be improved in sensitive areas.

재해 취약성 평가를 위한 기상자료 처리 프로그램 MetSystem 개발 (Development of Meteorologic Data Retrieval Program for Vulnerability Assessment to Natural Hazards)

  • 장민원;김상민
    • 농촌계획
    • /
    • 제19권4호
    • /
    • pp.47-54
    • /
    • 2013
  • Climate change is the most direct threatening factors in sustaining agricultural productivity. It is necessary to reduce the damages from the natural hazards such as flood, drought, typhoons, and snowstorms caused by climate change. Through the vulnerability assessment to adapt the climate change, it is possible to analyze the priority, feasibility, effect of the reduction policy. For the vulnerability assessment, broad amount of weather data for each meterological station are required. Making the database management system for the meteorologic data could troubleshoot of the difficulties lie in handling and processing the weather data. In this study, we generated the meteorologic data retrieval system (MetSystem) for climate change vulnerability assessment. The user interface of MetSystem was implemented in the web-browser so as to access to a database server at any time and place, and it provides different query executions according to the criteria of meteorologic stations, temporal range, meteorologic items, statistics, and range of values, as well as the function of exporting to Excel format (*.xls). The developed system is expected that it will make it easier to try different analyses of vulnerability to natural hazards by the simple access to meteorologic database and the extensive search functions.

취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링 (Cyber Attack and Defense Modeling Using Vulnerability Metrics)

  • 이장세;지승도
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 2003년도 춘계학술대회논문집
    • /
    • pp.191-198
    • /
    • 2003
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (ⅰ) it is able to analyze behaviors of system emerged by interaction with functional elements of components composing network and each other, (ⅱ) it is able to analyze vulnerability in quantitative manner, and (ⅲ) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF

VULNERABILITY ASSESSMENTS AND RISK MANAGEMENT FOR CRITICAL INFRASTRUCTURES FROM HOMELAND SECURITY VIEWPOINTS

  • Chun Nen Huang;Yao-Chen Kuo
    • 국제학술발표논문집
    • /
    • The 3th International Conference on Construction Engineering and Project Management
    • /
    • pp.292-301
    • /
    • 2009
  • The employment of risk management theory in Urban Disaster Management System (UDMS) has become an important trend in recent years. The viewpoint of risk management is mainly a comprehensive risk assessment of various internal and external factors, and a subsequent handling of risks. Through continuous and systematic accumulation and analysis of risk information, disaster prevention and rescue system is established. Taking risk management theory as the foundation, Organization for Economic Cooperation and Development (OECD) has developed a series of UDMS in the mega-cities all over the world. With this system as a common platform, OECD cooperates with different cities to develop disaster prevention and rescue system consisting of vulnerability assessment methods, risk assessment and countermeasures. The paper refers to the urban disaster vulnerability assessment and risk management of OECD and the mega-cities of different advanced and developed countries in the world, and then constructs a preliminarily drafted structure for the vulnerability assessment methods and risk management mechanism in the metropolitan districts of Taiwan.

  • PDF