• Title/Summary/Keyword: 방화벽 문제

Search Result 78, Processing Time 0.021 seconds

A Study of Authentication of Using Multi-factor (다중체계 인증을 이용한 중요 시스템 보안 접근에 관한 연구)

  • Choi, Byeong-Hun;Kim, Sang-Geun;Bae, Je-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.73-80
    • /
    • 2009
  • Internet accidents have skyrocketed every year. It always has been threatened by the methods such as hacking and Spyware. The majority of security accident is formed of the loss of authentication information, and the internal user who is not authorized. The importance of security is also emphasized when someone tries to do something accessing to the main information system. Accordingly, Biometrics has been used in many ways. OTP, however, must have a few devices accessing to several systems, and Biometrics involve some risk of mis-recognition rate and mis-denial rate. It also has the risk possible to access to the main information system when losing OTP. This research reduced risks about the loss as separating RFID leader for mobile, Tag and the accessor's cellular phone, and is about pseudo random validation key generated from the administration system through contact with RFID leader for mobile and Tag. As sending the key to user's cell phone which is already registered, security is strengthened more than existing connection methods through the ID and password. RFID for mobile not generalized to the present has been studied as a tool accessing to the main information system.

Research on SecureOS Module Based on File System for Data Protection (데이터 보호를 위한 파일시스템 기반의 SecureOS Module에 관한 연구)

  • Yonggu JANG;Inchul KIM;Jisong RYU
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.26 no.4
    • /
    • pp.67-79
    • /
    • 2023
  • Service environments through laptops, smart devices, and various IoT devices are developing very rapidly. Recent security measures in these Internet environments mainly consist of network application level solutions such as firewall(Intrusion Prevention Systems) and IDS (intrusion detection system). In addition, various security data have recently been used on-site, and issues regarding the management and destruction of such security data have been raised. Products such as DRM(Digital Rights Management) and DLP(Data Loss Prevention) are being used to manage these security data. However despite these security measures, data security measures taken out to be used in the field are operated to the extent that the data is encrypted, delivered, and stored in many environments, and measures for encryption key management or data destruction are insufficient. Based on these issues we aim to propose a SecureOS Module, an OS-based security module. With this module users can manage and operate security data through a consistent interface, addressing the problems mentioned above.

Implementation of UDP-Tunneling Based Multicast Connectivity Solution for Multi-Party Collaborative Environments (다자간 협업 환경을 위한 UDP 터널링 기반의 멀티캐스트 연결성 솔루션의 구현)

  • Kim, Nam-Gon;Kim, Jong-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.3
    • /
    • pp.153-164
    • /
    • 2007
  • The Access Grid (AG) provides collaboration environments over the IP multicast networks by enabling efficient exchange of multimedia contents among remote users; however, since lots of current networks are still multicast-disabled, it is not easy to deploy this multicast-based multi-party AG. For this problem, the AG provides multicast bridges as a solution by putting a relay server into the multicast networks. Multicast-disabled clients make UDP connections with this relay server and receive forwarded multicast traffics in unicast UDP packets. This solution is facing several limitations since it requires duplicate forwarding of the same packet for each unicast peer. Thus, in this paper, we propose an alternate solution for the multicast connectivity problem of the AG based on the UMTP (UDP multicast tunneling protocol). By taking advantage of flexibilities of UMTP, the proposed solution is designed to improve the efficiency of network and system utilization, to allow reuse of multicast-based AG applications without modification, and to partially address the NAT/firewall traversal issues. To verify the feasibility of proposed solution, we have implemented a prototype AG connectivity tool based on the UMTP, named as the AG Connector.

Pattern-based Signature Generation for Identification of HTTP Applications (HTTP 응용들의 식별을 위한 패턴 기반의 시그니쳐 생성)

  • Jin, Chang-Gyu;Choi, Mi-Jung
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.1
    • /
    • pp.101-111
    • /
    • 2013
  • Internet traffic volume has been increasing rapidly due to popularization of various smart devices and Internet development. In particular, HTTP-based traffic volume of smart devices is increasing rapidly in addition to desktop traffic volume. The increased mobile traffic can cause serious problems such as network overload, web security, and QoS. In order to solve these problems of the Internet overload and security, it is necessary to accurately detect applications. Traditionally, well-known port based method is utilized in traffic classification. However, this method shows low accuracy since P2P applications exploit a TCP/80 port, which is used for the HTTP protocol; to avoid firewall or IDS. Signature-based method is proposed to solve the lower accuracy problem. This method shows higher analysis rate but it has overhead of signature generation. Also, previous signature-based study only analyzes applications in HTTP protocol-level not application-level. That is, it is difficult to identify application name. Therefore, previous study only performs protocol-level analysis. In this paper, we propose a signature generation method to classify HTTP-based traffics in application-level using the characteristics of typical semi HTTP header. By applying our proposed method to campus network traffic, we validate feasibility of our method.

Experimental Comparison of Network Intrusion Detection Models Solving Imbalanced Data Problem (데이터의 불균형성을 제거한 네트워크 침입 탐지 모델 비교 분석)

  • Lee, Jong-Hwa;Bang, Jiwon;Kim, Jong-Wouk;Choi, Mi-Jung
    • KNOM Review
    • /
    • v.23 no.2
    • /
    • pp.18-28
    • /
    • 2020
  • With the development of the virtual community, the benefits that IT technology provides to people in fields such as healthcare, industry, communication, and culture are increasing, and the quality of life is also improving. Accordingly, there are various malicious attacks targeting the developed network environment. Firewalls and intrusion detection systems exist to detect these attacks in advance, but there is a limit to detecting malicious attacks that are evolving day by day. In order to solve this problem, intrusion detection research using machine learning is being actively conducted, but false positives and false negatives are occurring due to imbalance of the learning dataset. In this paper, a Random Oversampling method is used to solve the unbalance problem of the UNSW-NB15 dataset used for network intrusion detection. And through experiments, we compared and analyzed the accuracy, precision, recall, F1-score, training and prediction time, and hardware resource consumption of the models. Based on this study using the Random Oversampling method, we develop a more efficient network intrusion detection model study using other methods and high-performance models that can solve the unbalanced data problem.

Development of the model and the hybrid algorithm toy analyzing the dynamic heat conduction in the CPES system (CPFS 내에서 일어나는 동적 열전도 현상을 해석하기 위한 수식 및 혼합알고리즘 개발)

  • Yun Jongpil;Kwon Seong-Pil;Yoon En Sup
    • 한국가스학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.120-125
    • /
    • 2003
  • 본 연구는 원자력 발전소에 있는 방화벽의 케이블 관통부위에 설치된 CPFS(Cable Penetration Fire Stop)시스템 안에서 일어나는 동적열전달 현상을 3 차원으로 나타낼 수 있는 시험시뮬레이터에 사용될 수학적 모델과 수치계산 알고리즘의 개발에 관한 것이다. CPFS 내에서 일어나는 열전도 현상을 나타내는 지배방정식은 주어진 조건들 하에서 포물선형 편미분방정식(Parabolic PDE)으로 나타난다. 문제를 단순화하기 위해 열의 흐름을 두 성분으로 나누었다 즉, 케이블과 평행한 선을 따라서 일어나는 열전도와 벽면과 평행한 평면 위에서 일어나는 열전도로 나누었다. 먼저 선을 따라 일어나는 동적 열전도 현상을 나타내는 PDE를 연속과완화(SOR: Successive Over-Relaxation)를 적용하여 유한한 불연속점들에 대한 연립 상미분방정식(ODE)으로 전환했고, 그 연립방정식은 ODE Solver 를 이용하여 풀 수 있었다. 둘째로, 각 불연속 점에 위치한 평면 위에서 일어나는 열전도를 계산하기 위해서, 유한요소의 합을 근사식으로 이용하여 PDE를 ODE로 전환해서 계산하는 유한요소법(Finite Element Method)이 이용된다. 여기서 시간과 공간의 함수 T(x, y, z, t)인 온도는 각 선의 점들과 각 평면의 요소들에 대해서 일정한 시간간격으로 초기온도와 경계온도를 업데이트하여 계산을 반복한다. 이러한 일련의 계산결과를 바탕으로 CPFS 시스템 내에서의 온도분포의 동적인 변화를 해석한다. 결론적으로 관통하는 케이블이 CPFS 시스템의 온도분포에 매우 중요한 역할을 한다는 것을 알 수 있다. 시뮬레이션 결과는 CPFS 내의 온도분포를 쉽게 이해할 수 있도록 3 차원 그래픽으로 나타냈으며, 상용소프트웨어 FEMLAB 으로 계산한 결과와 비교해서 개발된 모델과 계산 알고리즘의 정당성을 보였다. 맞이하고 있음을 볼 수 있다. 국내광업이 21C 급변하는 산업환경에 적응하여 생존하기 위해서는 각종 첨단산업에서 요구하는 소량 다품종의 원료광물을 적기에 공급 할 수 있는 전문화된 기술력을 하루속히 확보해야 하며, 이를 위해 고품위의 원료광물 확보를 위한 탐사 및 개발을 적극 추진하고 가공기술의 선진화를 위해 선진국과의 기술제휴 등 자원산업 글로벌화 정책이 절실히 요구되고 있음을 알 수 있다. 또한 삶의 질을 향상시키려는 현대인의 가치관에 부합하기 위해서는 각종 소비제품의 원료를 제공하는 광업의 본래 목적 이외에도 자연환경 훼손을 최소화하며 개발 할 수밖에 없는 구조적인 어려움에 직면할 수밖에 없다. 이처럼 국내광업이 안고 있는 여러 가지 난제들을 극복하기 위해서는 업계와 정부가 합심하여 국내광업 육성의 중요성을 재인식하고 새로운 마음가짐으로 관련 정책을 수립 일관성 있게 추진해 나가야 할 것으로 보인다.의 연구 결과를 요약하면 다음과 같다. 첫째, 브랜드 이미지와 서비스 품질과의 관계에서 브랜드이미지는 서비스 품질의 선행변수가 될 수 있음을 증명하였으며 4개 요인의 이미지 중 사풍이미지를 제외한 영업 이미지, 제품 이미지, 마케팅 이미지가 서비스 품질에 영향을 미치고 있음을 알 수 있다. 둘째, 지각된 서비스 품질과 가격 수용성과의 관계에서, 서비스 품질은 최소 가격에 신뢰서비스 요인에서 정의 영향을 미치고 있으나 부가서비스, 환경서비스에서는 역의 영향을 미침을 알수 있고, 최대 가격에 있어서는 욕구서비스 요인은 정의 영향을 미치지만 부가서비스의 경우에는 역의 영향을 미치고 있음을 알 수 있다. 셋째, 서비스품질과 재 방문 의도와의 관계에 있어서 서비스품질은 재 방문 의도에 영향을 미침을 알 수 있다. 따라서 브랜드 이미지는 서비스품질의 선행변수가 될 수 있으며, 서비스품질은 가격 수용성과 재방문 의도에 영향을 미치고 있음을 알 수

  • PDF

SIEM System Performance Enhancement Mechanism Using Active Model Improvement Feedback Technology (능동형 모델 개선 피드백 기술을 활용한 보안관제 시스템 성능 개선 방안)

  • Shin, Youn-Sup;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.896-905
    • /
    • 2021
  • In the field of SIEM(Security information and event management), many studies try to use a feedback system to solve lack of completeness of training data and false positives of new attack events that occur in the actual operation. However, the current feedback system requires too much human inputs to improve the running model and even so, those feedback from inexperienced analysts can affect the model performance negatively. Therefore, we propose "active model improving feedback technology" to solve the shortage of security analyst manpower, increasing false positive rates and degrading model performance. First, we cluster similar predicted events during the operation, calculate feedback priorities for those clusters and select and provide representative events from those highly prioritized clusters using XAI (eXplainable AI)-based event visualization. Once these events are feedbacked, we exclude less analogous events and then propagate the feedback throughout the clusters. Finally, these events are incrementally trained by an existing model. To verify the effectiveness of our proposal, we compared three distinct scenarios using PKDD2007 and CSIC2012. As a result, our proposal confirmed a 30% higher performance in all indicators compared to that of the model with no feedback and the current feedback system.

Heavy Metals of Landfilled Biomass and Their Environmental Standard, Including CCA-treated Wood for Eco-housing Materials (방부처리 목재를 포함한 토양매립 바이오메스의 중금속 함량과 안전성 문제)

  • Lim, Kie-Pyo;Lee, Jong-Tak;Bum, Jung-Won
    • Journal of the Korean Wood Science and Technology
    • /
    • v.34 no.4
    • /
    • pp.37-45
    • /
    • 2006
  • Recently, wood-framed houses has been built in the Korea for pension. Wood is good material for human healthy, while the construction lumbers are treated with preservative such as CCA (chromated copper arsenate), which contain some toxic elements for human body. However, if the waste woody biomass treated with various heavy metals, which has been collected from house construction or demolition, was fired in the field, and incinerated or landfilled after mass collection, such components will result in the toxic air pollutants in the burning or land fills, and spreaded into other areas. So the careful selection of wood and chemicals are required in advance for house construction, in particular, for environment-friendly housings. Therefore, this study was carried out to determine the content of toxic heavy metals in woody materials such as domestic hinoki and imported hemlock treated with CCA for housing materials, and the post-treated wood components such as organic fertilizer, sludge, dry-distilled charcoal and carbonized charcoal, to be returned finally into soil. The results are as follows. 1) The chemical analysis of toxic trace elements in various solid biomass required accurate control and management of laboratory environment, and reagents and water used, because of the error of data due to various foreign substances added in various processing and transporting steps. So a systematic analyzers was necessary to monitor the toxic pollutants of construction materials. 2) In particular, the biomass treated with industrial biological or thermal conditions such as sludge or charcoals was not fully dissolvable after third addition of $HNO_3$ and HF. 3) The natural woody materials such as organic fertilizer, sludge. and charcoals without any treatment of preservatives or heavy metal components were nontoxic in landfill because of the standard of organic fertilizers, even after thermal or biological treatments. 4) The CC A-treated wood for making the construction wood durable should not be landfilled, because of its higher contents of toxic metals than the criterion of organic fertilizer for agriculture or of natural environment. So the demolished waste should be treated separately from municipal wastes.