사용자 상황인지 기반 네트워크 보안 구조 연구

  • Published : 2017.02.28

Abstract

컨텍스트가 필요한 서비스 및 스마트 기기의 수가 증가함에 따라, 사용자에게 편의성과 유연한 보안성을 탑재한 새로운 보안 정책의 필요성이 강조되고 있다. 특히 현재의 보안 기술을 사용하는데 많은 어려움을 겪고 있는 어린이나 노인, 장애인 등의 IT 취약 계층을 위한 새로운 보안 정책은 절실하다. 편의성과 유연한 보안 정책은 사용자의 서비스 이용 패턴, 위치 등과 같이 공격 상황을 판단할 수 있는 정보를 수집, 분석하여 사용자에게 적합한 보안 서비스 제공 기술이 정의되어야 한다. 본 연구는 언급한 요구사항들을 반영한 사용자 상황인지 기반 네트워크 보안 아키텍처 설계, 사용자 상황인지 데이터 수집, 사용자 상황 분석 플랫폼 연구 그리고 상황인지 기반 보안 어플리케이션 연구 및 분석을 담고 있다.

Keywords

References

  1. Berker Agir, Jean-Paul Calbimonte and Karl Aberer, "Semantic and Sensitivity Aware Location Privacy Protection for the Internet of Things," PrivOn'14 Proceedings of the 2nd International Conference on Society, Privacy and the Semantic Web - Policy and Technology, Vol. 1316, pp. 58-63.
  2. Dwork, Cynthia, and Aaron Roth. "The algorithmic foundations of differential privacy." Foundations and Trends in Theoretical Computer Science 9.3-4 (2014): 211-407.
  3. Vishal M. Patel, Rama Chellappa, Deepak Chandra, and Brandon Barbello, "Continuous user authentication on mobile devices: Recent progress and remaining challenges." IEEE Signal Processing Magazine 33.4 (2016): 49-61. https://doi.org/10.1109/MSP.2016.2555335
  4. "SIEM: A Market Snapshot," Dr. Dobb's Journal, Feb. 2007.
  5. J. Hayes, "Cybersecurity and the Big Yellow Elephant,"Cloudera Vision Blog, May 2015.
  6. K. M. Kavanagh, O. Rochford, and T. Bussa,"Magic Quadrant for Security Information and Event Management,"Gartner, Aug. 2016.
  7. Bhatt, P. K. Manadhata, and L. Zomlot, "The operational role of security information and event management systems," IEEE Security & Privacy, vol. 12, no. 5, 2014.
  8. "Google 2-Step Verification," Google, retrieved at 2016-11-30.https://www.google.com/landing/2 step/
  9. "Two-factor authentication for Apple ID," Apple, retrieved at 2016-11-30, https://support.apple.com/en-us/HT204915
  10. Gibler, Clint, et al. "AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale." International Conference on Trust and Trustworthy Computing. Springer Berlin Heidelberg, 2012.
  11. Kapadia, Apu, David Kotz, and Nikos Triandopoulos. "Opportunistic sensing: Security challenges for the new paradigm." 2009 First International Communication Systems and Networks and Workshops. IEEE, 2009.
  12. H. Witte, C. Rathgeb and C. Busch, "Context-Aware Mobile Biometric Authentication based on Support Vector Machines," 2013 Fourth International Conference on Emerging Security Technologies, Cambridge, 2013, pp. 29-32.
  13. T. Gisby, ""Soft" Sensors Are Breaking Into Four Major Industries,"Aug 2015.
  14. Shi, Weidong, et al. "Senguard: Passive user identification on smartphones using multiple sensors." 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, 2011.
  15. Juefei-Xu, Felix, et al. "Gait-id on the move: pace independent human identification using cell phone accelerometer dynamics." Biometrics: Theory, Applications and Systems (BTAS), 2012 IEEE Fifth International Conference on. IEEE, 2012.
  16. Feng, Tao, et al. "Continuous mobile authentication using touchscreen gestures." Homeland Security (HST), 2012 IEEE Conference on Technologies for. IEEE, 2012.
  17. Araújo, Lívia CF, et al. "User authentication through typing biometrics features." IEEE Transactions on Signal Processing 53.2 (2005): 851-855. https://doi.org/10.1109/TSP.2004.839903
  18. Berker Agir, Jean-Paul Calbimonte and Karl Aberer, "Semantic and Sensitivity Aware Location Privacy Protection for the Internet of Things," PrivOn'14 Proceedings of the 2nd International Conference on Society, Privacy and the Semantic Web - Policy and Technology, Vol. 1316, pp. 58-63.
  19. Dwork, Cynthia, and Aaron Roth. "The algorithmic foundations of differential privacy." Foundations and Trends in Theoretical Computer Science 9.3-4 (2014): 211-407.
  20. Vishal M. Patel, Rama Chellappa, Deepak Chandra, and Brandon Barbello, "Continuous user authentication on mobile devices: Recent progress and remaining challenges." IEEE Signal Processing Magazine 33.4 (2016): 49-61. https://doi.org/10.1109/MSP.2016.2555335
  21. Santos, Nuno, et al. "Using ARM TrustZone to build a trusted language runtime for mobile applications." ACM SIGARCH Computer Architecture News. Vol. 42. No. 1. ACM, 2014.