• Title/Summary/Keyword: system vulnerability

Search Result 992, Processing Time 0.035 seconds

A research paper for e-government's role for public Big Data application (공공의 빅데이터 활용을 위한 전자정부 역할 연구)

  • Bae, Yong-guen;Cho, Young-Ju;Choung, Young-chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2176-2183
    • /
    • 2017
  • The value of Big-Data which is a main factor of the fourth Industrial Revolution enhances industrial productivity in private sector and provides administrative services for nations and corporates in public sector. ICT-developed countries are coming up with Big-Data application in public sector rapidly. Especially, when it comes to social crisis management, they are equipped with pre-forcasting system. Korean Government also emphasizes Big-Data application in public sector for the social crisis management. But the reality where the overall infrastructure vulnerability reveals requires preparation and operation of measurement for social problems. Accordingly, we need to analyze Big-Data application problem and benchmark the precedented cases, thereby, direct policy diversity. Hence, this paper proposes the roles and rules of E-government analyzing problems from Big-Data application. The following policy proposes open Information and legal&institutional improvement, Big-Data service considerations threatening privacy issues in Big-Data ecosystem, necessity of operational and analytical technology for Big-Data and related technology in technical implication of Big-Data.

Improvement of a Verified Secure Key Distribution Protocol Between RFID and Readers (RFID와 리더간의 안전성이 검증된 키 분배 프로토콜의 개선)

  • Bae, Woo-Sik;Lee, Jong-Yun
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.331-338
    • /
    • 2011
  • The RFID system includes a section of wireless communication between the readers and the tags. Because of its vulnerability in terms of security, this part is always targeted by attackers and causes various security problems including the leakage of secret and the invasion of privacy. In response to these problems, various protocols have been proposed, but because many of them have been hardly implementable they have been limited to theoretical description and theorem proving without the accurate verification of their safety. Thus, this study tested whether the protocol proposed by Kenji et al. satisfies security requirements, and identified its vulnerabilities such as the exposure of IDs and messages. In addition, we proposed an improved RFID security protocol that reduced the number of public keys and random numbers. As one of its main characteristics, the proposed protocol was designed to avoid unnecessary calculations and to remove vulnerabilities in terms of security. In order to develop and verify a safe protocol, we tested the protocol using Casper and FDR(Failure Divergence Refinements) and confirmed that the proposed protocol is safe in terms of security. Furthermore, the academic contributions of this study are summarized as follows. First, this study tested the safety of a security protocol through model checking, going beyond theorem proving. Second, this study suggested a more effective method for protocol development through verification using FDR.

A Study on the Coolant leaks Prevention Design of Heaters for Combat Vehicles (전투차량용 온수히터 냉각수 누수방지 설계에 관한 연구)

  • Park, Dong Min;Kwak, Daehwan;Jang, Jongwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.379-385
    • /
    • 2020
  • This paper presents a design for preventing coolant leaks in the core part of a heater mounted in a combat vehicle. The heater is a device that makes heated coolant flow through the heater core in the crew room. A problem with coolant leaks in the heater core area during the operation of a combat vehicle was identified. This problem is caused mainly by high pressure at the junction of the tank and tube due to the vulnerability of this area. To solve this problem, an improved core was made by improving the welding method and changing the end region of the heater core to a structure that can withstand high pressure. When pressure was applied sequentially to the existing core and improved core, a leak occurred at 7.0 kgf/㎠ in the existing core while the improved core maintained its structure up to 17.0 kgf/㎠, highlighting the improvement. Finally, performance tests and environment tests were conducted to demonstrate the suitability of the improved structure. The improved heater will be applied to combat vehicles. This paper is expected to serve as a reference for improving defense capabilities by securing reliability as well as the design and analysis of failures of similar equipment.nse capabilities through securing reliability as well as the design and analysis of failures of similar equipment.

Integrated Security Management with MCGA in IPv6 Network (IPv6 네트워크 환경에서 MCGA를 고려한 통합적인 보안관리 방안)

  • Oh, Ha-Young;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.27-38
    • /
    • 2007
  • IPv6 has appeared for solving the address exhaustion of IPv4 and for guaranteeing the problems of security and QoS. It occurs the unexpected new attacks of IPv6 as well as the existing attacks of IPv4 because of the increasing address space to 128bits and the address hierarchies for efficient network management and additions of the new messages between nodes and routers like neighbor discovery and auto address configuration for the various comfortable services. For the successful transition from IPv4 to IPv6, we should get the secure compatibility between IPv4 hosts or routers working based on secure and systematic policy and IPv6. Network manager should design security technologies for efficient management in IPv4/IPv6 co-existence network and IPv6 network and security management framework designation. In this paper, we inspected the characteristics of IPv4 and IPv6, study on security requirement for efficient security management of various attacks, protocol, service in IPv4/IPv6 co-existence and IPv6 network, and finally suggest integrated solution about security vulnerability of IPv6 network in considering of analysis of IPv6 system, host and application, IPv6 characteristics, modified CGA(MCGA).

An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit (심볼릭 링크 공격 취약성 검출을 위한 분석 기법)

  • Joo, Seong-Yong;Ahn, Joon-Seon;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.45-52
    • /
    • 2008
  • In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.

Extreme Weather Frequency Data over 167 Si-gun of S. Korea with High-resolution Topo-climatology Model (고해상도 소기후모형을 이용한 국내 167개 시·군별 이상기상 발생빈도 자료)

  • Jo, Sera;Shim, Kyo Moon;Park, Joo Hyeon;Kim, Yong Seok;Hur, Jina
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.22 no.3
    • /
    • pp.164-170
    • /
    • 2020
  • The weather conditions, such as temperature, precipitation, and sunshine duration, play one of the key roles in Agriculture. In particular, extreme weather events have crucial impacts on growth and yields of crops. This study estimates statistics of extreme weather events in 167 Si-gun over South Korea derived from high-resolution(30 and 270m) topo-climatology model for key three meteorological variables(temperature, precipitation and sunshine duration). It is shown that the characteristic of each extreme weather frequency in the topo-climatology model is in good agreement with observation from Korean Meteorological Administration's Automatic Surface Observing System. Moreover, it is possible to analyze the statistics of extreme weather more realistically because this data can cover the weather at not-observed regions. Hence, this data is expected to be used as baseline data for assessing vulnerability to extreme weather and politic decisions for damage reduction in agricultural sector.

A Study on Designing Method of VoIP QoS Management Framework Model under NGN Infrastructure Environment (NGN 기반환경 에서의 VoIP QoS 관리체계 모델 설계)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.12 no.1
    • /
    • pp.85-94
    • /
    • 2011
  • QoS(Quality of Service) is defined as "The collective effect of service performance which determines the degree of satisfaction of a user of the service" by ITU-T Rec. E.800. While the use of VoIP(Voice Over Internet Protocol) has been widely implemented, persistent problems with QoS are a very important sue which needs to be solved. This research is finding the assignment of VoIP QoS to deduct how to manage the control system and presenting the QoS control process and framework under NGN(Next Generation Network) environment. The trial framework is the modeling of the QoS measurement metrics, instrument, equipment, method of measurement, the series of cycle & the methodology about analysis of the result of measurement. This research underlines that the vulnerability of the VoIP protocol in relation to its QoS can be guaranteed when the product quality and management are controlled and measured systematically. Especially it's very important time to maintain the research about VoIP QoS measurement and control because the big conversion of new network technology paradigm is now spreading. In addition, when the proposed method is applied, it can reduce an overall delay and can contribute to improved service quality, in relation to signal, voice processing, filtering more effectively.

Efficiency Analysis of Greenhouse Gas Reduction according to Local Eco-friendly Housing Development Planned Element Using DEA Models (DEA모형을 이용한 지역별 친환경주택단지계획 요소에 따른 온실가스 감축 효율성 분석)

  • Hong, Ha-Yeon;Lee, Joo-Hyung
    • Land and Housing Review
    • /
    • v.4 no.1
    • /
    • pp.33-42
    • /
    • 2013
  • This study which are recognized that the lack of empirical research about the efficiency of the elements of environmentally friendly housing development planned presented housing design elements and policies to revitalize for the reduction of greenhouse gas emissions by analyzing the effectiveness of reduction of greenhouse gas output. In addition, it used various models of DEA which are accepted until now effective technique to evaluate the performance of the organization. In conclusion, there are effective 5 regionals which are Seoul, Incheon, Ulsan, South Chungcheong Province, South Gyeongsang Province. other regionals was analyzed to be inefficient. The conclusion from this study are as follows: First, in case of 11 regionals which are analyzed to be inefficient, they have to difference plan elements to make up. So each region should establish strategy to complement vulnerability. Second, not only internal architectural factors but institutional, and external environmental factors also affect the reduction of greenhouse gas emissions. And weighted scores also were moderately high. But levels of weighted scores still less than the ratio of Good quality housing. So it can be determined that evaluation of individual architecture still considered important. It need to pay more attention to the operating system and the external environmental factors.

Fragility Analysis of RC Moment Resisting Frame with Masonry Infill Walls (비내력벽을 가진 RC모멘트저항골조의 취약도 해석)

  • Ko, Hyun;Park, Yong-Koo;Lee, Dong-Guen
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.22 no.4
    • /
    • pp.355-362
    • /
    • 2009
  • Many of residential buildings, which have pilotis in lower stories to meet the architectural needs, are recently constructed in Korea. Usually, infill walls located in the upper stories of these buildings may cause a soft first story, which is very weak from the earthquake resistance. In the design of the buildings, the infill walls of upper stories are usually considered as non-structural elements and thus they are not included in the analytical model. However, the infill walls may affect the seismic behavior of the residential buildings. Therefore, the differences in seismic behaviors of RC buildings with and without masonry infill walls are required to be investigated. In this study, seismic fragility analyses were performed for masonry infilled low-rise RC moment-resisting frames. And seismic behaviors of RC moment-resisting frame with/without masonry infill walls were evaluated. Two types of structural system with the same frame and different allocation of infill walls are used to evaluate the influence of masonry infill walls on seismic behavior of RC moment-resisting frames. The infill walls were modeled as bi-equivalent diagonal struts. The fragility analyses show that the seismic performance of RC moment-resisting frames with soft story is below the desirable building seismic performance level recommended by current seismic codes, indicating high vulnerability of RC moment-resisting frames with soft story.

Utilization and Excavation Practices of Fire-Fighting Vulnerable Zone Model (소방취약지 모델의 활용 및 적용사례 발굴)

  • Choi, Gap Yong;Chang, Eun Mi;Kim, Seong Gon;Cho, Kwang-Hyun
    • Spatial Information Research
    • /
    • v.22 no.3
    • /
    • pp.79-87
    • /
    • 2014
  • In order to foster rapid disaster response and public life protection, National Emergency Management Agency has been trying to spread 'Emergency Rescue Standard System' on a national scale since 2006. The agency has also intensified management of firefighter's safety on disaster site by implementing danger predication training, specialized training and education and safety procedure check as a part of safety management officer duties. Nevertheless, there are limitations for effective fire fighting steps, such as damage spreading and life damage due to unawareness of illegal converted structure, structure transformation by high temperature and nearby hazardous material storage as well as extemporary situation handling endangered firefighter's life. In order to eliminate these limitations there is a need for an effort and technology application to minimize human errors such as inaccurate situational awareness, wrong decision built on experience and judgment of field commander and firefighters. The purpose of this study is to propose a new disaster response model which is applied with geospatial information. we executed spatial contextual awareness map analysis using fire-fighting vulnerable zone model to propose the new disaster response model and also examined a case study for Dalseo-gu in Daegu Metropolitan City. Finally, we also suggested operational concept of new proposed model on a national scale.