• Title/Summary/Keyword: 기밀보호

Search Result 383, Processing Time 0.03 seconds

A Study on Anomaly Detection Model using Worker Access Log in Manufacturing Terminal PC (제조공정 단말PC 작업자 접속 로그를 통한 이상 징후 탐지 모델 연구)

  • Ahn, Jong-seong;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.321-330
    • /
    • 2019
  • Prevention of corporate confidentiality leakage by insiders in enterprises is an essential task for the survival of enterprises. In order to prevent information leakage by insiders, companies have adopted security solutions, but there is a limit to effectively detect abnormal behavior of insiders with access privileges. In this study, we use the Unsupervised Learning algorithm of the machine learning technique to effectively and efficiently cluster the normal and abnormal access logs of the worker's work screen in the manufacturing information system, which includes the company's product manufacturing history and quality information. We propose an optimal feature selection model for anomaly detection by studying clustering methods.

Study on Vulnerability and Countermeasures of Authentication Mechanism in Wireless LAN (무선 랜 환경 인증 메커니즘의 취약성 분석 및 대응방안 연구)

  • Choi, Jin-Ho;Oh, Soohyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1219-1230
    • /
    • 2012
  • Recently, lots of users are using wireless LAN providing authentication and confidentiality with security mechanism such as WEP, WPA. But, weakness of each security mechanism was discovered and attack methods that user's information was exposed or modified to the third parties with it and abused by them were suggested. In this paper, we analyzed architecture of security mechanisms in wireless LAN and performed PSK cracking attack and cookie session hijacking attack with the known vulnerability. And, an improved 4-way handshake mechanism which can counter PSK cracking attack and a cookie replay detection mechanism which can prevent cookie session hijacking attack were proposed. Proposed mechanisms are expected to apply to establish more secure wireless LAN environment by countering existing vulnerability.

Design and Verification of the Integrated Log Analysis System for Enterprise Information Security (기업정보 유출 방지를 위한 통합 로그분석 시스템 설계 및 검증)

  • Lee, Jae-Yong;Kang, Soo-Yong
    • Journal of Digital Contents Society
    • /
    • v.9 no.3
    • /
    • pp.491-498
    • /
    • 2008
  • The leakage of sensitive information by an insider within the organization becomes a serious threat nowadays. Sometimes, these insider threats are more harmful to an organization than external attack. Companies cannot afford to continue ignoring the potential of insider attacks. The purpose of this study is to design an integrated log analysis system that can detect various types of information leakages. The system uses threat rules generated through risk analysis, and monitors every aspect of the online activities of authorized insider. Not only should system have the ability to identify abnormal behavior, they should also be able to predict and even help to prevent potential risk. The system is composed of three modules, which are log collector, log analyzer and report generator.

  • PDF

The design and Implementation of Web Security System using the Cookies (쿠키를 이용한 웹 보안시스템 설계 및 구현)

  • 송기평;박기식;한승희;조인준
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.3-14
    • /
    • 2001
  • A Web server makes use of the HTTP(Hyper Text Transfer Protocol) to communicate with a client. The HTTP is a stateless protocol; the server does not maintain any state information for ongoing interactions with the client. Therefore, the HTTP inevitably requires additional overhead as repeating data key-in to user for continuing communications. This overhead in Web environment can be resolved by the cookie technologies. However, the cookie is usually unsecured due to the clear-text to transfer on the network and to store in the file. That is, information in the cookie is easy to exposure, copy, and even change. In this paper, we propose a secure cookie mechanism appropriate to Web environment, and then present a design and implement of secure Web system based on the scheme. The Web system can be used to any web environment. It also provides some security services, such as confidentiality, authentication, integrity.

TCST : A Technology for Verifying Control Flow Integrity for Smart Contracts within a Trusted Execution Environment (TCST : 신뢰실행환경 내에서 스마트 컨트랙트의 제어 흐름 무결성 검증을 위한 기술)

  • Park, Seonghwan;Kwon, Donghyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1103-1112
    • /
    • 2022
  • Blockchain technology is widespread in everyday life and various industry fields. It guarantees integrity and transparency between blockchain network participants through a distributed ledger. The smart contract is modifying and managing the distributed ledger, which is the most important component of guaranteeing integrity and transparency of blockchain network. Still, smart contracts are also a component of blockchain networks, it is disclosed to network participants transparently. For this reason, the vulnerability of smart contracts could be revealed easily. To mitigate this, various studies are leveraging TEE to guarantee the confidentiality of smart contracts. In existing studies, TEE provides confidentiality of smart contracts but guaranteeing the integrity of smart contracts is out of their scope. In this study, we provide not only the confidentiality of smart contracts but also their integrity, by guaranteeing the CFI of smart contracts within TEE.

A New and Flexible Mdlti-signcryption Protocol (유연성을 가진 새로운 멀티-사인크립션 프로토콜)

  • Seo Seung-Hyun;Lee Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.6
    • /
    • pp.288-295
    • /
    • 2005
  • Multi-signcryption scheme is an extension of signcryption scheme for multi-signers performing together the signcryption operation on messages, and it provides useful cryptographic functions such as confidentiality and authenticity for the sound circulation of messages through the Internet. In this paper, we show the weaknesses of the previous multi-signcryption schemes. And then we propose a new multi-signcryption scheme that improves the weaknesses and the efficiency of the previous schemes. Our scheme efficiently provides message flexibility, order flexibility, message verifiability, order verifiability, message confidentiality, message unforgeability, non-repudiation and robustness. Therefore, it is suitable for protecting messages and multi-signers from malicious attacks in the Internet.

Performance Analysis of Key Exchange Protocols on ETSI Standard (ETSI 표준 키 교환 프로토콜의 성능 분석)

  • Lee, Young-Seok;Choi, Hoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.6
    • /
    • pp.520-527
    • /
    • 2015
  • The key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, key confirmation, and key freshness. In this paper, we present the security functions in ETSI(European Telecommunications Standards Institute), and analyze the specification of the security primitives and the key exchange protocols for the authenticated key agreement between RCST(Return Channel Satellite Terminal) and NCC(Network Control Centre). ETSI key exchange protocols consists of Main Key Exchange, Quick Key Exchange, and Explicit Key Exchange. We analyse the pros and cons of key exchange protocols based on performance analysis and performance evaluation.

A Study on the Applying Fully Homomorphic Encryption in the Cloud Computing Environment (클라우드 컴퓨팅 환경에서의 동형암호기술 적용에 대한 연구)

  • Chang, Jiwon;Nam, Kevin;Cho, Myunghyun;Paek, Yunheung
    • Annual Conference of KIPS
    • /
    • 2020.05a
    • /
    • pp.264-267
    • /
    • 2020
  • 클라우드가 보편적으로 활용되면서 클라우드 서버에 정보를 저장하거나 연산을 하는 일은 일상이 되었다. 그러나, 이러한 클라우드 컴퓨팅 서비스가 급격히 증가하면서, 개인정보보호와 데이터 보안성, 기밀성 및 시스템의 안정성에 대한 우려가 높아지고 있다. 클라우드는 데이터를 위탁받아 연산하는 과정에서 사용자들의 개인정보를 유출시킬 수 있는 문제점이 있다. 이러한 문제점을 해결하기 위한 방법 중 현재 가장 각광 받고 있는 해결책은 바로 동형암호기술이다. 동형암호는 이전 암호체계와 다르게 사용자의 암호화된 데이터를 복호화하지 않고서도 연산할 수 있어서, 이를 이용하게 되면 사용자 데이터의 기밀성을 보장하면서도 원하는 결과를 얻을 수 있다. 그러나, 동형암호를 클라우드 컴퓨팅 환경에 적용하는데 가장 큰 장애물은 바로 연산 오버헤드가 대단히 크다는 점이다. 본 연구에서는 최신 동형암호 기술을 소개하고 연산속도를 증가시키기 위한 솔루션들에 대해 알아보고자 한다.

모바일 어플리케이션 분석 및 검증 솔루션 구현 사례

  • Ko, Seung Won;Joung, Sang Gon
    • Review of KIISC
    • /
    • v.23 no.2
    • /
    • pp.21-28
    • /
    • 2013
  • 스마트폰의 급증 현상은 모바일 생태계의 패러다임을 변화시켰으며 다양한 SW 컨텐츠의 양산과 더불어 그 활용 영역의 확대를 가져왔다. 이에 따라 필연적으로 모바일 악성코드도 증가되고 있으며 개인정보 또는 회사 기밀정보의 무단 유출이라는 사회적 이슈도 대두되게 되었다. 이러한 문제를 해결하기 위해서는 모바일 어플리케이션에 대한 검증이 필요하고, 검증하는 방법에는 크게 정적분석 방법과 동적분석 방법이 있으며 분석 방법에 대한 자세한 내용은 선배 전문가들의 앞선 연구 사례와 논문에 몇 차례 소개된 바 있다. 이에 본 고에서는 정적분석 및 동적분석 방법을 응용하여 (주)안랩에서 실제로 운용 중인 모바일 어플리케이션의 분석 및 검증 솔루션(AMSD) 구현사례를 소개하고자 한다. 여기에는 기 알려진 정적분석 방법과 동적분석 방법에 대한 간략한 서술이 포함되어 있으며 시스템 아키텍처 정보와 실제 오픈 마켓을 대상으로 운용하면서 얻어진 앱 분석 사례 및 개선 방향도 담고 있다. 이를 통해 모바일 오픈 마켓 운영 시의 안전성과 신뢰성 확보 및 건전한 모바일 생태계 유지를 도모하는 데 조금이나마 도움이 되었으면 하는 바램이다.

Secure Distributed Computing System Based on PKI and SOAP (PKI와 SOAP에 기반한 분산 컴퓨팅 보안 프로토콜에 관한 연구)

  • Han Youn-Tack;Kim Joo-Han;Kim Ji-Ho;Bae Du-Hyun;Park Se-Hyun;Song Oh-Young
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.481-485
    • /
    • 2006
  • 분산 컴퓨팅 시스템에 관한 연구가 네트워크가 발달함에 따라 점차 다양한 분야에서 활발하게 이루어지고 있다. 하나의 컴퓨터의 성능으로는 처리하기 힘든 일을 여러 컴퓨터 시스템이 분산하여 처리함으로써 효율성을 극대화 시킬 수 있도록 하는 이 기술은 네트워크가 발달할 수록 점점 더 각광 받을 것이다. 본 논문에서는 분산 컴퓨팅 시스템에서 무결성, 기밀성을 보장하기 위해 인증 시스템을 이용한 보안 프로토콜을 제시한다.

  • PDF