• Title/Summary/Keyword: 보안 중요도

Search Result 2,301, Processing Time 0.03 seconds

SSH Traffic Identification Using EM Clustering (EM 클러스터링을 이용한 SSH 트래픽 식별)

  • Kim, Kyoung-Lyoon;Kim, Myung-Sup;Kim, Hyoung-Joong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.12
    • /
    • pp.1160-1167
    • /
    • 2012
  • Identifying traffic is an important issue for many networking applications including quality of service, firewall enforcement, and network security. Once we know the purpose of using the traffic in the firewall, we can allow or deny it and provide quality of service, and effective operation in terms of security. However, a number of applications encrypts traffics in order to enhance security or privacy. As a result, effective traffic monitoring is getting more difficult. In this paper, we analyse SSH encrypted traffic and identify differences among SSH tunneling, SFTP, and normal SSH traffics. By using EM clustering, we identify traffics and validate experiment results.

Active Warehouse Condition Management System based on RFID/USN Security (보안을 고려한 RFID/USN 기반의 능동형 창고 상태 관리 시스템)

  • John, Young-Jun;Choi, Yong-Sik;Park, Sang-Hyun;Han, Soo;Shin, Seung-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.122-127
    • /
    • 2006
  • RFID/USN 은 유비쿼터스 사회의 중요한 기반 인프라로서 고려되고 있다. 또한 다양한 연구를 통해 실용적인 접목이 시도 되고 있다. 특히 물류 시스템에서 물류의 입출 재고와 상태 관리를 위한 연구가 진행 중에 있으며 이는 물품 보관 단위인 파렛트(Pallet) 에 RFID 태그를 부착하여 입/출고시의 물품을 식별하고, Zigbee 무선 통신기능을 가진 센서 모듈에 의해 물품의 환경 상태 정보를 파악하는 형태로 이루어진다. 본 논문은 RFID/ USN 기반의 창고 상태 관리 시스템에서 상태정보 습득 과정의 보안적용을 위한 시스템을 구성을 주된 목적으로 한다. 부가적으로 상태정보 습득에 사용되는 이동형 단말장치의 기능에 대해서 제안한다. 창고 내에 배치되는 RFID 와 센서노드간의 적용 관계 또한 정의한다. 결과적으로 본 논문은 의사판단의 주체인 현장 관리자에 적절한 제어 정보의 제공과 센서의 동작을 제어하기 위한 RFID tag 보안 접근, 그리고 센서 노드 자체의 생존성 이라는 세 가지 관점의 절충점을 찾기 위한 시도로서 설계하였다.

  • PDF

Security Core Technology Implementation for MTM Hardware-Based Smart Devices (MTM하드웨어 기반 스마트 단말 보안 핵심기술 구현)

  • Kim, Jeong Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1455-1459
    • /
    • 2016
  • Recently, the frequency of dealing important information regarding financial services like paying through smart device or internet banking on smart device has been increasing. Also, with the development of smart device execution environment towards open software environment, it became easier for users to download and use random application software, and its security aspect appears to be weakening. This study will inspect features of hardware-based smart device security technology. Furthermore, this study will propose a realization method in MTM hardware-based secure smart device execution environment for application software runs that in smart device.

A Study on the Image Encryption for Video Conference System Construction that Security Improves (보안성이 향상된 화상회의 시스템 구축을 위한 영상 암호화에 관한 연구)

  • 김형균;김단환;오무송
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.631-634
    • /
    • 2002
  • Video conference system has guided swiftness of information transmission and business processing taking away time and manufacturing drug of space that is happened that long-distance gather and talk. But, leakage of important meeting content, peculation etc., in that execute video-conferences can happen. Therefore, research about video conference system of safety is progressing under secure superhigh speed information communication fetters. This treatise studied about techniques to encipher videotex to prevent variation and outward flow of burn information, peculation etc., except general encryption notation such as user certification to have drawn problem about stability of general video conference system, and is used present as countermeasure about here. Used improved Vernam's encryption techniques to encrypt videotex.

  • PDF

An Efficiency Authentication Security Mechanism of VANET in Highway (고속도로에서 차량네트워크(VANET)의 효율적인 인증 보안 매커니즘)

  • Kim, Gab-In;Kim, Yong-Cahn;Lee, Jong-Kun
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.3
    • /
    • pp.57-64
    • /
    • 2016
  • Since the information transmitted in VANET is distributed in an open access environment, the security problem is one of the most critical issue in VANET. For the communicate efficiently in VANET, each RSU(Roadside Unit) or OBU(On-Board Units) need certain features that will help them to gather information, to inform their neighbors and to make decisions by considering all of the collected information. In this paper, we propose a novel authentication scheme guaranteeing secure RSUs to OBUs of VANET in highway used the ID-based authentication scheme. We show a usefulness and effectiveness of proposed authentication scheme after compared with previous works.

Tracking Analysis of User Privacy Damage using Smartphone (스마트폰 사용으로 인한 사용자 프라이버시 피해 현황 분석)

  • Jeong, Yoon-Su
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.13-18
    • /
    • 2014
  • The usage rate of user due to advances in smartphone development is higher than the usage rate to use a PC. However, smartphone usage popularized research to protect sensitive information, such as smart phone users personal information, financial information is a small state. In this paper, we analyzed the various vulnerabilities in smartphone studies to date have been looking into the corresponding port smart consumer dispute resolution methods and criteria for smartphone security attack methods and analysis. In particular, the threat of such a network, malware, Peep attack of the security threats arising from the smartphone they can avoid or mitigate threats to minimize the smartphone security damage is done to the disclosure of personal information, such as direct damage or financial loss the analysis of that method.

  • PDF

Design and Implementation of Web-based Hierarchical Network Management System using SSL (SSL을 이용한 웹기반 계층적 네트워크 관리 시스템의 설계 및 구현)

  • 황일선;이명선;유기성;김종근;조강홍;정진욱
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.1-15
    • /
    • 2002
  • Network management system exchanges information between management servers to manage other network as well as local network for MSP(Management Service Provider) business. Because communication line that is used here is communication line that several users use, other user can steal a important information that are passed through communication line. For these information include important information of administrator or equipments, These information should be protected. Usually it is use much SSL to security of communication and it wish to protect information using SSL in communication between management servers' or communication between server and client at network management system to use much SSL for security of communication.

  • PDF

Design of Access Control System based RBAC for Home Network Services (홈 네트워크 서비스를 위한 RBAC 기반의 접근제어 시스템의 설계)

  • Kim, Do-Woo;Kim, Geon-Woo;Lee, Jun-Ho;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.833-836
    • /
    • 2005
  • Compared to corporation and government networks, home devices and services connected in a home networks has security threats because of the use of various wired and wireless network, middleware and protocol in digital home environment, a restricted system resource of home information appliances and the users who do not care about security. So security is critical element to provide secure services in a home network environments. In this paper we design the access control system based on RBAC to offer secure home network services.

  • PDF

Performance Evaluation of IPSec Protocol for Storage Service (스토리지 서비스를 위한 IPSec 프로토콜 성능 평가)

  • Hwang, Jong-Mo;Ryu, Jun-Kil;Park, Chan-Ik
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.790-792
    • /
    • 2005
  • 최근 급격히 증가하는 정보량으로 인해서 기업체뿐만 아니라 개인들을 위한 스토리지 수요도 폭발적으로 증가하고 있다. 이에 따라 네트워크를 통한 스토리지 서비스 수요도 점차 증가하고 있다. 기업체의 패쇄적인, 파이버 채널을 이용한 SAN은 설치 및 유지비용 등의 문제로 인해서 개인 사용자 필 소규모 사업자들에게 네트워크 스토리지를 위한 가능한 솔루션이 아니다. 이와 관련하여 IP 네트워크를 이용한 네트워크 스토리지가 많이 소개되고 있으나 IP 네트워크를 이용한 네트워크 스토리지는 외부에 의해 데이터가 변조되거나 중요한 데이터가 유출되는 등의 보안상의 문제점을 안고 있다. 이러한 네트워크 스토리지의 보안상 문제점을 해결하기 위한 기술 중 하나가 IPSec 프로토콜이다. IPSec 프로토콜은 IP 계층에서 네트워크를 통해 전송되는 패킷들을 암호화함으로써 안전한 통신을 보장하는 프로토콜이다. 본 논문은 유무선 네트워크 환경에서 IPSec이 지원하는 여러 알고리즘을 이용하여 IPSec의 성능을 측정하고 분석하여, IPSec이 네트워크 스토리지의 보안에, 적합한지를 알아본다. 특히 IPSec은 IPv6에서는 필수 기능으로 도입되기 때문에 네트워크 스토리지를 위해서 IPSec의 성능을 평가해보는 것은 의미가 있다고 생각한다.

  • PDF

Design of the Encryption Module for File System in the Solaris Kernel (Solaris 운영체제에서 파일 시스템 암호 모듈 설계)

  • Jang Seung Ju
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.201-206
    • /
    • 2005
  • This paper designs Cryptography File System to support encrypting function. The CFS is supported in Solaris Kernel to encrypt or decrypt a plaintext or an encrypted text by using the dynamic linking mechanism. The Cryptography File System supports safe use of computer system even if an intruder gets a file by connecting with network. If he/she does not have a Cryptography File System module in the Solaris Kernel, he/she cannot read that file. The Cryptography File System was experimented into the Solaris kernel.