• Title/Summary/Keyword: 보안 제어

Search Result 1,534, Processing Time 0.023 seconds

Strategies Building Knowledge_Base to Respond Effectively to Advanced Cyber Threats (고도화된 사이버 위협에 효과적으로 대응하기 위한 Knowledge_Base 구축전략)

  • Lee, Tae-Young;Park, Dong-Gue
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.357-368
    • /
    • 2013
  • Our society has evolved into a fully connected society in a mixed reality environment enabling various knowledge sharing / management / control / creation due to the expansion of broadband ICT infrastructure, smart devices, cloud services and social media services. Therefore cyber threats have increased with the convenience. The society of the future can cause more complex and subtle problems, if you do not have an effective response to cyber threats, due to fusion of logical space and physical space, organic connection of the smart object and the universalization of fully connected society. In this paper, we propose the strategy to build knowledge-base as the basis to actively respond to new cyber threats caused by future various environmental changes and the universalization of fully connected society.

An Efficient RDF Query Validation for Access Authorization in Subsumption Inference (포함관계 추론에서 접근 권한에 대한 효율적 RDF 질의 유효성 검증)

  • Kim, Jae-Hoon;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.36 no.6
    • /
    • pp.422-433
    • /
    • 2009
  • As an effort to secure Semantic Web, in this paper, we introduce an RDF access authorization model based on an ontology hierarchy and an RDF triple pattern. In addition, we apply the authorization model to RDF query validation for approved access authorizations. A subscribed SPARQL or RQL query, which has RDF triple patterns, can be denied or granted according to the corresponding access authorizations which have an RDF triple pattern. In order to efficiently perform the query validation process, we first analyze some primary authorization conflict conditions under RDF subsumption inference, and then we introduce an efficient query validation algorithm using the conflict conditions and Dewey graph labeling technique. Through experiments, we also show that the proposed validation algorithm provides a reasonable validation time and when data and authorizations increase it has scalability.

Design of mobile communication antenna for total monitoring of the security light (보안등의 통합 모니터링을 위한 이동통신용 안테나 설계)

  • Yoo, Jin-Ha;Cho, Dong-Kyun;Lee, Young-Soon
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.5
    • /
    • pp.491-496
    • /
    • 2013
  • In this paper, a half-wavelength folded-slot antenna, which can be applied to RF module for 3G mobile communications by which security lights are monitored and controlled, is proposed. The proposed antenna can be regarded as modified folded-slot structure which has the size reduced to a half of conventional ${\lambda}g$ folded-slot antenna and can be placed at the ground plane edge. In spite of that, the proposed antenna still maintain the advantage of conventional folded-slot antenna that input impedance is close to $50{\Omega}$. The antenna is designed and fabricated within the upper space of $40.5{\times}10mm^2$ on $40.5{\times}62mm^2$ substrate for 3G mobile communication frequency band. The measured impedance bandwidth and antenna gain are 390 MHz and 2 dBi respectively.

HyGIS based on cloud computing (클라우드 기반 HyGIS)

  • Won, Young Jin;Choi, Yun Seok
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.316-316
    • /
    • 2016
  • HyGIS는 DEM 기반의 수문지형처리를 중심으로 다양한 모형을 연계할 수 있도록 구성된 S/W 모음이다. 이는 한국건설기술연구원을 비롯한 다수의 기관 및 연구원들이 노력한 성과물이다. 본 연구는 기존 HyGIS 연구과정에서 도출된 성과물의 실용화 사업화를 위한 방안을 연구하였다. 이를 위하여 S/W 테스팅, 오픈소스 도입, 클라우드 컴퓨팅으로 나누어 접근하였다. 먼저 S/W의 테스팅에 있어서 기존 개발 소스코드는 블랙박스 테스트 방식의 동등 클래스 분할, 경계 값 분석 등 일부 모듈에 대한 단위 테스트와 제한적인 통합테스트가 수행된 바 있다. 보다 체계적인 테스트 단계로서 화이트박스 테스트 개념 중 문장/분기/조건 커버리지에 대하여 검토하였으며, 실제 소스코드 중 핵심 구간에 대한 적용 및 정량화를 통하여 현 수준을 객관적으로 진단하였고 보완 방안을 도출하였다. 오픈소스 적용을 위하여 QGIS, MapWindow 등 공간정보 분야의 최신 오픈소스 모듈을 비교 검토하였다. 적용 단계는 이를 기존 HyGIS S/W에 반영시키는 과정이며, S/W 관점에서는 컴포넌트 모듈의 대체라고 표현될 수 있다. 대규모의 전환 비용이 발생되므로 적용 후보에 대하여는 기능적 측면 뿐만 아니라 마이그레이션 비용과 중장기적인 유지보수 비용을 고려한 검토가 이루어 졌다. 한편 오픈소스 기술의 적용은 단순히 구성 요소 원가절감 측면만이 아닌, 중장기적 유지보수 체계 도모 및 지속가능한 생태계로의 전환에 더 큰 의의가 있다. 마지막으로 클라우드 컴퓨팅 기술의 적용 분야이다. HyGIS 입력 Data의 공급을 위한 인프라로서 자체 구축 인프라가 아닌 IaaS 클라우드인 Blob Storage 및 CDN을 시험 적용하였다. 클라우드를 활용함으로써 초기 비용을 최소화하고 합리적 비용으로 유연한 확장이 가능한(Scale Out, Scale Up) 구조를 취하게 되었다. 또한 입력 Data 공급 서버를 위한 Storage 측면만이 아니라 S/W의 배포에 있어서도 클라우드 컴퓨팅 기술을 활용하고자 시도하였다. 클라우드 기술을 활용하여 HyGIS S/W가 설치된 VM(Virtual Machine)자체를 임대하는 방식으로 시험 구성 되었다. VM에 대한 RDP 프로토콜 Access에 있어서 IP기반 접근 제어를 통하여 보안을 강화하는 방안을 실험하였으며, ISO 27001, ISO 27018 등 관련 보안 규정에 부합하는 서비스 제공이 가능하도록 검토하였다. 이러한 클라우드 VM방식 서비스를 통하여 Package형 S/W 뿐만 아니라 Subscription 방식의 서비스 제공 방식을 병행할 수 있다. 사용자에게는 S/W 설치 및 H/W Lock 구비 과정이 생략되는 이점이 있다.

  • PDF

A Study on Dynamic Code Analysis Method using 2nd Generation PT(Processor Trace) (2세대 PT(Processor Trace)를 이용한 동적 코드분석 방법 연구)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.97-101
    • /
    • 2019
  • If the operating system's core file contains an Intel PT, the debugger can not only check the program state at the time of the crash, but can also reconfigure the control flow that caused the crash. We can also extend the execution trace scope to the entire system to debug kernel panics and other system hangs. The second-generation PT, the WinIPT library, includes an Intel PT driver with additional code to run process and core-specific traces through the IOCTL and registry mechanisms provided by Windows 10 (RS5). In other words, the PT trace information, which was limited access only by the first generation PT, can be executed by process and core by the IOCTL and registry mechanism provided by the operating system in the second generation PT. In this paper, we compare and describe methods for collecting, storing, decoding and detecting malicious codes of data packets in a window environment using 1/2 generation PT.

Blockchain-based Electronic Medical Record Sharing FrameworkUsing Ciphertext Policy Attribute-Based Cryptography for patient's anonymity (환자의 익명성이 보장되는 암호문 정책 속성중심 암호를 활용한 블록체인 기반 전자의무기록 공유 프레임워크)

  • Baek, Seungsoo
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.49-60
    • /
    • 2019
  • Medical record is part of the personal information that values the dignity and value of an individual, and can lead to serious social prejudice and disadvantage to an individual when it is breached illegally. In addition, the medical record has been highly threatened because its value is relatively high, and external threats are continuing. In this paper, we propose a medical record sharing framework that guarantees patient's privacy based on blockchain using ciphertext policy-based attribute based proxy re-encryption scheme. The proposed framework first uses the blockchain technology to ensure the integrity and transparency of medical records, and uses the stealth address to build the unlinkability between physician and patient. Besides, the ciphertext policy attribute-based proxy re-encryption scheme is used to enable fine-grained access control, and it is possible to share information in emergency situations without patient's agreement.

Improved Intelligent Routing Protocol in Vehicle Ad-hoc Networks (차량 Ad-hoc 혹 통신에서 개선된 지능형 경로 프로토콜)

  • Lee, Dong Chun
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.129-135
    • /
    • 2021
  • Greedy protocols show good performance in Vehicular Ad-hoc Networks (VANETs) environment in general. But they make longer routes causing by surroundings or turn out routing failures in some cases when there are many traffic signals which generate empty streets temporary, or there is no merge roads after a road divide into two roads. When a node selects the next node simply using the distance to the destination node, the longer route is made by traditional greedy protocols in some cases and sometimes the route ends up routing failure. Most of traditional greedy protocols just take into account the distance to the destination to select a next node. Each node needs to consider not only the distance to the destination node but also the direction to the destination while routing a packet because of geographical environment. The proposed routing scheme considers both of the distance and the direction for forwarding packets to make a stable route. And the protocol can configure as the surrounding environment. We evaluate the performance of the protocol using two mobility models and network simulations. Most of network performances are improved rather than in compared with traditional greedy protocols.

A study of extended processor trace decoder structure for malicious code detection (악성코드 검출을 위한 확장된 프로세서 트레이스 디코더 구조 연구)

  • Kang, Seungae;Kim, Youngsoo;Kim, Jonghyun;Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.19-24
    • /
    • 2018
  • For a long time now, general-purpose processors have provided dedicated hardware / software tracing modules to provide developers with tools to fix bugs. A hardware tracer generates its enormous data into a log that is used for both performance analysis and debugging. Processor Trace (PT) is a new hardware-based tracing feature for Intel CPUs that traces branches executing on the CPU, which allows the reconstruction of the control flow of all executed code with minimal labor. Hardware tracer has been integrated into the operating system, which allows tight integration with its profiling and debugging mechanisms. However, in the Windows environment, existing studies related to PT focused on decoding only one flow in sequence. In this paper, we propose an extended PT decoder structure that provides basic data for real-time trace and malicious code detection using the functions provided by PT in Windows environment.

  • PDF

Lightweight Packet Authentication for Access Control in IEEE 802.11 (IEEE 802.11에서의 접근 제어를 위한 Lightweight 패킷 인증)

  • Lee, Keun-Soon;Kim, Hyo-Jin;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.29-38
    • /
    • 2005
  • Because IEEE 802.11 has several security vulnerabilities, IEEE 802.11i was proposed and accepted. But IEEE 802.11i has much overhead for most of users for the web surfing. Besides not only node the authentication but also the packet authentication is needed to communicate. Although IEEE 802.11i uses TKIP(Temporal Key integrity Protocol) and CCMP(CTR with CBC-MAC Protocol), they have a lot of overheads. In this paper, Lightweight Packet Authentication(LIPA) is proposed. LIPA has less overhead and short delay so that it can be affordable for simple web-surfing which does not need stronger security. After comparing performances of LIPA with those of TKIP and CCMP, LIPA is more efficient than other schemes for transmitting packets.

A Study on Security Architecture for Digital Content Dissemination (디지탈 컨텐츠 배포를 위한 보안 체계에 관한 연구)

  • 김대엽;주학수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.147-155
    • /
    • 2003
  • The diffusion of internet infrastructure and a fast increase of Population to use it is becoming a base of the service that can use various information, data and digital contents which were provided through off-line physically and used. Recently, the. techniques for copy deterrence and copyright protection have been important in e-commerce because various contents in digital form can be duplicated easily. The Access Control(AC) technique that only a user having the qualifications can access and use contents normally has been studied. The Conditional Access System(CAS) used in a satellite broadcasting md Digital Right Management System(DRMS) used for contents service are representative models of current commercialized access control. The CAS and DRM can be considered as an access control technique based on the payment based type(PBT). This paper describe the access control method of payment free type(PFT) suggested in [5] which are independent on the payment structure. And then we suggest a new access control method of payment free type which is more efficient than the previous one.