• Title/Summary/Keyword: 네트워크 상황 정보

Search Result 1,799, Processing Time 0.027 seconds

A Secure and Privacy-Aware Route Tracing and Revocation Mechanism in VANET-based Clouds (VANET 기반 클라우드 환경에서 안전과 프라이버시를 고려한 경로추적 및 철회 기법)

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.795-807
    • /
    • 2014
  • Vehicular Ad hoc Network (VANET) has gone through a rich amount of research and currently is making its way towards the deployment. However, surprisingly it evolved to rather more applications and services-rich breed referred to as VANET-based clouds due to the advancements in the automobile and communication technologies. Security and privacy have always been the challenges for the think tanks to deploy this technology on mass scale. It is even worse that some security issues are orthogonally related to each other such as privacy, revocation and route tracing. In this paper, we aim at a specific VANET-based clouds framework proposed by Hussain et al. namely VANET using Clouds (VuC) where VANET and cloud infrastructure cooperate with each other in order to provide VANET users (more precisely subscribers) with services. We specifically target the aforementioned conflicted privacy, route tracing, and revocation problem in VANET-based clouds environment. We propose a multiple pseudonymous approach for privacy reasons and leverage the beacons stored in the cloud infrastructure for both route tracing and revocation. In the proposed scheme, revocation authorities after colluding, can trace the path taken by the target node for a specified timespan and can also revoke the identity if needed. Our proposed scheme is secure, conditional privacy preserved, and is computationally less expensive than the previously proposed schemes.

A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response (효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구)

  • Kim, Kyu-Il;Choi, Sang-So;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1185-1195
    • /
    • 2014
  • Domestic and international CERTs are carrying out security monitoring and response services based on security devices for intrusion incident prevention and damage minimization of the organizations. However, the security monitoring and response service has a fatal limitation in that it is unable to detect unknown attacks that are not matched to the predefined signatures. In recent, many approaches have adopted the darknet technique in order to overcome the limitation. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. Thus, all the incoming traffic to the darknet can be regarded as attack activities. In this paper, we present a collection and analysis method of malicious URLs based on darkent traffic for advanced security monitoring and response service. The proposed method prepared 8,192 darknet space and extracted all of URLs from the darknet traffic, and carried out in-depth analysis for the extracted URLs. The analysis results can contribute to the emergence response of large-scale cyber threats and it is able to improve the performance of the security monitoring and response if we apply the malicious URLs into the security devices, DNS sinkhole service, etc.

A Study on the Performance Analysis and synthesis for a Differentiated Service Networks (차등 서비스 네트워크에 대한 성능 분석과 합성에 대한 연구)

  • Jeon, Yong-Hui;Park, Su-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.123-134
    • /
    • 2002
  • The requirement for QoS (Quality of Service) has become an important Issue as real-time or high bandwidth services are increasing, such as Internet Telephony, Internet broadcasting, and multimedia service etc. In order to guarantee the QoS of Internet application services, several approaches are being sought including IntServ (Integrated Service) DiffServ(Differentiated Srvices), and MPLS(Multi-Protocol Label Switching). In this paper, we describe the performance analysis of QoS guarantee mechanism using the DiffServ. To analyze how the DiffServ performance was affected by diverse input traffic models and the weight value in WFQ(Weighted Fair Queueing), we simulated and performed performance evaluation under a random, bursty, and self-similar input traffic models and for diverse input parameters. leased on the results of performance analysis, it was confirmed that significant difference exist in packet delay and loss depending on the input traffic models used. However, it was revealed that QoS guarantee is possible to the EF (expedited Forwarding) class and the service separation between RF and BE (Best Effort) classes may also be achieved. Next, we discussed the performance synthesis problem. (i. e. derived the conservation laws for a DiffServ networks, and analysed the performance variation and dynamic behavior based on the resource allocation (i.e., weight value) in WFQ.

The Adequacy Analysis of Korean MVNO Policy (MVNO 정책의 타당성 분석)

  • Shin, Jin;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.926-929
    • /
    • 2014
  • In Korea MVNO was introduced in 2011 when twenty seven years had passed since Korea Mobile Telecom started mobile phone service in 1984. Whithout having its frequency bands and network facilities MVNO can resell the mobile telecom services to the consumers by purchasing MNO's service. That can bring competition more efffective that can lower communication costs through the alternatives. In the early 2000s, the need for the introduction of the MVNO has been raised already by scholars in Korea. But it wasn't until the late 2000s, rate cuts appeared to be a major policy issue, and in 2011 Korean government begin to try to introduce its own MVNO's. In may 2014, MVNO's mobile communication market share reached 6%, but Korea dose not have a firm system yet. However, if government authorities did not insist 3 mobile telecom companies system and recognize global MVNO flow quickly the national cost would be significantly reduced. In the mean time mobile telecom companies have maintained similar billing system and level of service but competed to attract consumers only. It looks like some level of mutual collision and the government cannot help recognizing the situation but it did not do any effective policy improvement effort and government only levied penalties.

  • PDF

A Secure and Lightweight Authentication Scheme for Ambient Assisted Living Systems (전천 후 생활보조 시스템을 위한 안전하고 경량화 된 인증기법)

  • Yi, Myung-Kyu;Choi, Hyunchul;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.77-83
    • /
    • 2019
  • With the increase in population, the number of such senior citizens is increasing day by day. These senior citizens have a variety of care needs, but there are not enough health workers to look after them. Ambient Assisted Living (AAL) aims at ensuring the safety and health quality of the older adults and extending the number of years the senior citizens can live independently in an environment of their own preference. AAL provides a system comprising of smart devices, medical sensors, wireless networks, computer and software applications for healthcare monitoring. AAL can be used for various purposes like preventing, curing, and improving wellness and health conditions of older adults. While information security and privacy are critical to providing assurance that users of AAL systems are protected, few studies take into account this feature. In this paper, we propose a secure and lightweight authentication scheme for the AAL systems. The proposed authentication scheme not only supports several important security requirements needed by the AAL systems, but can also withstand various types of attacks. Also, the security analysis results are presented to show the proposed authentication scheme is more secure and efficient rather than existing authentication schemes.

Static Identification of Firmware Linux Kernel Version by using Symbol Table (심볼 테이블을 이용한 펌웨어 리눅스 커널 버전 정적 식별 기법)

  • Kim, Kwang-jun;Cho, Yeo-jeong;Kim, Yun-jeong;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.67-75
    • /
    • 2022
  • When acquiring a product having an OS, it is very important to identify the exact kernel version of the OS. This is because the product's administrator needs to keep checking whether a new vulnerability is found in the kernel version. Also, if there is an acquisition requirement for exclusion or inclusion of a specific kernel version, the kernel identification becomes critical to the acquisition decision. In the case of the Linux kernel used in various equipment, sometimes it becomes difficult to pinpoint the device's exact version. The reason is that many manufacturers often modify the kernel to produce their own firmware optimized for their device. Furthermore, if a kernel patch is applied to the modified kernel, it will be very different from its base kernel. Therefore, it is hard to identify the Linux kernel accurately by simple methods such as a specific file existence test. In this paper, we propose a static method to classify a specific kernel version by analyzing function names stored in the symbol table. In an experiment with 100 Linux devices, we correctly identified the Linux kernel version with 99% accuracy.

Cortex M3 Based Lightweight Security Protocol for Authentication and Encrypt Communication between Smart Meters and Data Concentrate Unit (스마트미터와 데이터 집중 장치간 인증 및 암호화 통신을 위한 Cortex M3 기반 경량 보안 프로토콜)

  • Shin, Dong-Myung;Ko, Sang-Jun
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.111-119
    • /
    • 2019
  • The existing smart grid device authentication system is concentrated on DCU, meter reading FEP and MDMS, and the authentication system for smart meters is not established. Although some cryptographic chips have been developed at present, it is difficult to complete the PKI authentication scheme because it is at the low level of simple encryption. Unlike existing power grids, smart grids are based on open two-way communication, increasing the risk of accidents as information security vulnerabilities increase. However, PKI is difficult to apply to smart meters, and there is a possibility of accidents such as system shutdown by sending manipulated packets and sending false information to the operating system. Issuing an existing PKI certificate to smart meters with high hardware constraints makes authentication and certificate renewal difficult, so an ultra-lightweight password authentication protocol that can operate even on the poor performance of smart meters (such as non-IP networks, processors, memory, and storage space) was designed and implemented. As a result of the experiment, lightweight cryptographic authentication protocol was able to be executed quickly in the Cortex-M3 environment, and it is expected that it will help to prepare a more secure authentication system in the smart grid industry.

Development of Evaluation Indicators for Optimizing Mixed Traffic Flow Using Complexed Multi-Criteria Decision Approaches (다기준 복합 가중치 결정 기반 혼재 교통류 최적화 평가지표 개발)

  • Donghyeok Park;Nuri Park;Donghee Oh;Juneyoung Park
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.2
    • /
    • pp.157-172
    • /
    • 2024
  • Autonomous driving technology, when commercialized, has the potential to improve the safety, mobility, and environmental performance of transportation networks. However, safe autonomous driving may be hindered by poor sensor performance and limitations in long-distance detection. Therefore, cooperative autonomous driving that can supplement information collected from surrounding vehicles and infrastructure is essential. In addition, since HDVs, AVs, and CAVs have different ranges of perceivable information and different response protocols, countermeasures are needed for mixed traffic that occur during the transition period of autonomous driving technology. There is a lack of research on traffic flow optimization that considers the penetration rate of autonomous vehicles and the different characteristics of each road segment. The objective of this study is to develop weights based on safety, operational, and environmental factors for each infrastructure control use case and autonomous vehicle MPR. To develop an integrated evaluation index, infra-guidance AHP and hybrid AHP weights were combined. Based on the results of this study, it can be used to give right of way to each vehicle to optimize mixed traffic.

A Knowledge Management System for Supporting Development of the Next Generation Information Appliances (차세대 정보가전 신제품 개발 지원을 위한 지식관리시스템 개발)

  • Park, Ji-Soo;Baek, Dong-Hyun
    • Information Systems Review
    • /
    • v.6 no.2
    • /
    • pp.137-159
    • /
    • 2004
  • The next generation information appliances are those that can be connected with other appliances through a wired or wireless network in order to make it possible for them to transmit and receive data between them and to be remotely controlled from inside or outside of the home. Many electronic companies have aggressively invested in developing new information appliances to take the initiative in upcoming home networking era. They require systematic methods for developing new information appliances and sharing the knowledge acquired from the methods. This paper stored the knowledge acquired from developing the information appliances and developed a knowledge management system that supports the companies to use the knowledge and develop their own information appliances. In order to acquire the knowledge, this paper applied two methods for User-Centered Design in stead of using the general ones for knowledge acquisition. This paper suggested new product ideas by analyzing and observing user actions and stored the knowledge in knowledge bases, which included Knowledge from Analyzing User Actions and Knowledge from Observing User Actions. Seven new product ideas, suggested from the User-Centered Design, were made into design mockups and their videos were produced to show the real situations where they would be used in home of the future, which were stored in the knowledge base of Knowledge from Producing New Emotive Life Videos. Finally, data on present development states of future homes in Europe and Japan and newspapers articles from domestic newspapers were collected and stored in the knowledge base of Knowledge from Surveying Technology Developments. This paper developed a web-based knowledge management system that supports the companies to use the acquired knowledge. Knowledge users can get the knowledge required for developing new information appliances and suggest their own product ideas by using the knowledge management system. This will make the results from this research not confined to a case study of product development but extended to playing a role of facilitating the development of the next generation information appliances.

Evolution of Relationship Marketing in the New Reality: Focused on the Pervasiveness of Digital New Media and the Enlargement of Customer Participation (21세기 새로운 현실에서 Relationship Marketing의 진화: 디지털 뉴미디어 환경의 보편화와 고객 참여의 고도화를 중심으로)

  • Lim, Jong Won;Cho, Ho Hyeon;Lee, Jeong Hoon
    • Asia Marketing Journal
    • /
    • v.13 no.4
    • /
    • pp.105-137
    • /
    • 2012
  • After relationship marketing emerged as a new approach in the marketing field in the 1980s, it has been widely studied in the United States, Europe and Asia. Rapid environmental changes and global competition has made it inevitable for companies to consider their relationships with the environment more closely. Under these circumstances, relationship marketing has held a position as a pivotal paradigm in the field of strategy as well as in marketing. In addition, relationship marketing has overcome the limitations of a traditional marketing research while providing richer implications in company's marketing activities. The paradigm shift to relationship marketing has brought fundamental changes in a marketing point of view. First, in philosophical aspects, unlike past research which focused solely on customer satisfaction, organizational relationship parameters which focuses on trust and commitment has become key elements of successful relationship marketing while shifts in thoughts naturally take place from adaptive marketing to strategic marketing. Second, in structural aspects, the relational mechanism of governance such as network structure with a variety of relational partners has emerged as a new marketing organization from the previous simple structure focusing on the micro-economic, marketbased trading between seller and customer. Third, in behavioral aspects, it proposed the strategic course of the action of gaining an advantage over the competition on the individual firm level by focusing on building long-term relationships and considering partnership with the components in the entire marketing system, rather than with one-time transaction-centric action between a seller and a customer. Fourth, in the aspects of marketing performance, marketing performance was sought through the long-term and cooperative relationship with various stakeholders, including customers in the marketing system, focusing on the overall competitive advantage based on relationship rather than individual performance of individual companies' marketing activities, such as market share and customer satisfaction. However, studies of relationship marketing were mostly centered in interorganizational relationships focusing on the relational structure and properties of commercial sector in the marketing system. Paradoxically, the circumstance of the consumer's side that must be considered is evolving again in relationship marketing. In structural aspects, a community, as the new relationship governance structure in the digital environment, and in behavioral aspects, the changing role of consumer participation demanding big changes in the digital environment engaged in the marketing system. The possibility of building a relationship marketing community for common value creation is presented in terms of organization of consumers with the focus on changing marketing environment and marketing system according to the new realities of the 21st century- the popularity of digital environments and the diffusion of customer participation. Therefore, future research of relationship marketing must seek for a truly integrated model including all of the existing structure and properties of the research oriented relationship from both the commercial and consumer sector.

  • PDF