• Title/Summary/Keyword: 보안 중요도

Search Result 2,285, Processing Time 0.03 seconds

Hacking Countermeasures for Wireless Internet Service (무선 인터넷 서비스를 위한 해킹 대응 방안)

  • Kook, Jung Gak;Kim, Hee Wan
    • Journal of Service Research and Studies
    • /
    • v.6 no.3
    • /
    • pp.79-90
    • /
    • 2016
  • Wireless internet service is an important factor to support all industries. In order to connect and use the smart phones or the laptop via a wireless Internet connection, it has been increasing the hacking risks associated with it. As information spills through the DNS address modulation of the Internet router, hacking threats through a wireless router is present. In this paper, we are dealing with the hacking technique utilizing the overall vulnerability of a wireless LAN. We analyzed the need for the wireless LAN security through WEP encryption algorithm and the improved encryption algorithm. In addition, we presented a countermeasure against these hacking technologies which is WEP Crack using wireless vulnerability hacking technology, DDoS attacks, DNS Spoofing.

A Design of Dynamic Reconfigurable Real-Time Scheduler in Embedded Middleware Environments (내장형 미들웨어 환경에서 동적 재구성이 가능한 실시간 스케쥴러의 설계)

  • Seo, Young-Jun;Song, Young-Jae
    • Annual Conference of KIPS
    • /
    • 2004.05a
    • /
    • pp.277-280
    • /
    • 2004
  • 최근 디지털 가전과 모바일 컴퓨팅이 화두로 떠오르면서 내장형 기술이 전성기를 맞이하고 있으며, 다양한 내장형 시스템들간의 상호 운용성, 플랫폼 독립성과 이식성을 지원할 수 있는 환경을 제공하는 내장형 미들웨어의 중요성이 부각되고 있다. 미들웨어는 신뢰성, 안전성, 보안성, 실시간성 등과 같은 기능에 직접 포함되지 않는 비기능적 요구를 응용 분야에 따라 요구할 수 있으며, 그 때마다 다양한 비기능적 요구에 맞는 미들웨어를 각기 따로 개발하는 것은 지극히 어려운 일이다. 따라서, 비기능적 요구에 적합하게 미들웨어를 동적으로 재구성하는 컴포넌트 개발 방법이 주목 받고 있으며, 이를 통해 재구성된 내장형 미들웨어에서는 비기능적 요구인 실시간성이 요구되므로, deadline 만족 여부를 확인하는 스케쥴링 분석이 중요하다. 많은 최적의 스케쥴링 분석 알고리즘이 존재하나 그들 중 어느 것도 동적 재구성이 될 때 태스크 집합상의 가정(assumption)이 변경되는 내장형 미들웨어를 만족 시킬 수 없다. 가정에 적합한 스케쥴링 알고리즘으로 대체하기 위한 제안들은 대부분 정적 조립 환경에서 새로운 버전에 의해 기존 클래스를 교체하는 코드 수정에 기반하나, 동적 재구성을 통해 행위를 변경하는 내장형 미들웨어에서는 응용하기 어렵다. 따라서, 본 논문에서는 동적 재구성 환경에서 수행되는 내장형 미들웨어를 위해, 적합한 스케쥴링 알고리즘으로 대체 할 수 있는 스케쥴러를 런타임 컴포넌트 개조 기술 중 하나인 Type-safe delegation이 적용된 strategy 패턴을 기반으로 설계하였으며, 이를 통해 내장형 미들웨어 스케쥴러의 유연성과 확장성을 증가하는 방안을 제시하였다.

  • PDF

Recent Research Trends in Explosive Detection through Electrochemical Methods (전기화학적 방법을 통한 폭발물 검출 연구동향)

  • Lee, Wonjoo;Lee, Kiyoung
    • Applied Chemistry for Engineering
    • /
    • v.30 no.4
    • /
    • pp.399-407
    • /
    • 2019
  • The development of explosive detection technology in a security environment and fear of terrorism at homeland and abroad has been one of the most important issues. Moreover, research works on the explosive detection are highly required to achieve domestic production technology due to the implementation of aviation security performance certification system. Traditionally, explosives are detected by using classical chemical analyses. However, in the view of high sensitivity, rapid analysis, miniaturization and portability electrochemical methods are considered as promising. Most of electrochemical explosive detection technologies are developed in USA, China, Israel, etc. This review highlights the principle and research trend of electrochemical explosive detection technologies carried out overseas in addition to the research direction for future exploration.

A Failover Method in CCTV Network Video Recording Environment (CCTV 네트워크 영상 녹화 환경에서 장애 조치 기법)

  • Yang, Sun-Jin;Park, Jae-Pyo;Yang, Seung-Min
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.1-6
    • /
    • 2019
  • CCTV video recording system is recognized as evidence value of video data, and is widely used in real life for the purpose of security of facilities or security control, and it is developing in order to process high-resolution and high-capacity data in real time through network. However, there is no description of redundancy to prevent the loss of image data due to defects of unexpected equipment or external attack, and even if the redundancy is implemented, a high-capacity video stream is transmitted through the network, network overload can not avoided. In this paper, we propose and verify a failover method based on rules that can operate the redundancy scheme without inducing network overload in CCTV network video recording environment.

Implementation of Covert Channel Using Mutex Shared Resources in Virtual Machine (가상머신 내 mutex 공유 자원을 이용한 은닉 채널 구현)

  • Ko, Ki-Wan;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.961-971
    • /
    • 2019
  • Isolation between virtual machines in a cloud computing environment is an important security factor. The violation of isolation between virtual machines leads to interferences of shared resources and the implementation of covert channels. In this paper, the structure of Hyper-V hypervisor is analyzed to implement covert channels between virtual machines. Hyper-V uses a mutex technique for mutual exclusion between virtual machines. It indicates that isolation of virtual machines is violated and covert channels can be implemented due to mutex. We implemented several covert channels by designing a method for searching mutex resources applicable to Hyper-V with complex architectures. The mutex-based covert channel is not hardware dependent. If the covert channel is detected or defended, the defensive technique can be avoided by using the other covert channel among several covert channels.

A Scalar Multiplication Method and its Hardware with resistance to SPA(Simple Power Analysis) (SPA에 견디는 스칼라 곱셈 방법과 하드웨어)

  • 윤중철;정석원;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.65-70
    • /
    • 2003
  • In this paper, we propose a scalar multiplication method and its hardware architecture which is resistant to SPA while its computation speed is faster than Colon's. There were SPA-resistant scalar multiplication method which has performance problem. Due to this reason, the research about an efficient SPA-resistant scalar multiplication is one of important topics. The proposed architecture resists to SPA and is faster than Colon's method under the assumption that Colon's and the proposed method use same fmite field arithmetic units(multiplier and inverter). With n-bit scalar multiple, the computation cycle of the proposed is 2n·(Inversion cycle)+3(Aultiplication cycle).

Monitoring System of File Outflow through Storage Devices and Printers (저장매체와 프린터를 통한 파일유출 모니터링시스템)

  • Choi Joo-ho;Rhew Sung-yul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.51-60
    • /
    • 2005
  • The riles or intellectual property on computer systems have increasingly been exposed to such threats that they can be flowed out by internal users or outer attacks through the network. The File Outflow Monitoring System monitors file outflows at server by making the toe when users copy files on client computers into storage devices or print them, The monitoring system filters I/O Request packet by I/O Manager in kernel level if files are flowed out by copying, while it uses Win32 API hooking if printed. As a result, it has exactly made the log and monitored file outflows, which is proved through testing in Windows 2000 and XP.

A Study of Memory Information Collection and Analysis in a view of Digital Forensic in Window System (윈도우 시스템에서 디지털 포렌식 관점의 메모리 정보 수집 및 분석 방법에 관한 고찰)

  • Lee Seok-Hee;Kim Hyun-Sang;Lim JongIn;Lee SangJin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.87-96
    • /
    • 2006
  • In this paper, we examine general digital evidence collection process which is according to RFC3227 document[l], and establish specific steps for memory information collection. Besides, we include memory dump process to existing digital evidence collection process, and examine privacy information through dumping real user's memory and collecting pagefile which is part of virtual memory system. Especially, we discovered sensitive data which is like password and userID that exist in the half of pagefiles. Moreover, we suggest each analysis technique and computer forensic process for memory information and virtual memory.

Analysis and Improvement of ID-based Key Distribution Systems (개인정보에 기초한 키 분배방식의 분석 및 개선방안)

  • 임채훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.1 no.1
    • /
    • pp.47-65
    • /
    • 1991
  • An ID-based scheme provides a very efficient solution to the key distribution problem, since it can solve bothe the authentication problem and the communication complexity problem in a public key scheme. Especilly, and ID-Based ndninterative key distribution system plays an crucial roie in the one-way communication environment such as secure electronic mail, owing to its noninteractiveness. This paper aims at analyzing the previously proposed scheme s and providing possible improvements. It also demonstraes that the Maurey-Yacobi's scheme presented in Eurocry'91 is not secure, and provikdes an countemeasure to overcome the security problem.

Recoverable Password Based Key Exchange Protocol (복구 가능한 패스워드 기반 키 분배 프로토콜)

  • 손기욱;최영철;박상준;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.97-104
    • /
    • 2001
  • In this paper, we propose Recoverable Password Based Key Exchange Protocol(RPKEP). RPKEP has user who has password, server which share the secret key information with user, and password recovery agency(PRA) which help to recover the user\`s password. Proposed protocol has some advantages that it is secure against off-line dictionary attack which is considered most important in password based key exchange protocol and suer\`s security is preserved even though user\`s secret information stored in the server is disclosed. By applying Chaum\`s blind signature scheme in the process of password recovery, even the PRA can\`t obtain any information about user\`s password.