• Title/Summary/Keyword: 보안 중요도

Search Result 2,301, Processing Time 0.029 seconds

A Study of Integrated Authentication Model considering Mobility in Public Wireless LAN Network (공중 무선랜 망에서 이동성을 고려한 통합 인증 모델 연구)

  • 김진택;김관연;박세현
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.625-633
    • /
    • 2003
  • 무선랜은 현재 무선 네트워크에서 매우 중요한 역할을 차지하며, 앞으로의 차세대 무선 통합네트워크에서 또한 그 비중이 매우 높아 질 것이다 특히 핫스팟과 같은 공중망서비스의 확산으로 무선 인터넷 등의 차세대 정보 컨텐츠 산업의 중요한 매체로 부각되고 있다. 이에 부합하여 무선랜 서비스에 있어 사용자의 프라이버시(Privacy) 및 접근제어(Access Control), 인증(Authentication), 과금(Accounting), 빌링(Billing) 등의 다양한 보안 문제가 중요한 이슈로 대두되고 있다. 본 논문에는 공중 무선랜에서의 이동성이 고려된 인증 모델을 여러 국제 표준에 맞추어 제안하고, 그에 대한 검증 결과를 함께 제시한다. 제안된 모델은 상호 연동성 및 호환성을 보장하기 위해 Diameter를 기반 기술로 사용하였다.

  • PDF

Context Access Control in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서의 컨텍스트 접근 제어 고찰)

  • Jung Heon-Man;Lee Se-Hoon
    • KSCI Review
    • /
    • v.14 no.1
    • /
    • pp.175-184
    • /
    • 2006
  • In this paper, we study to two research direction about information security in ubiquitous computing environment. First, researches on context-aware access control using user's context or environment conditions based on role-based control. Second, researches on model for access control about context information in ubiquitous computing utilizing role base access control model. Two research directions are the one of the most important point technology in that embody ubiquitous environment in the actual world.

  • PDF

Development Testing/Evaluating Methods about Security Functions based on Digital Printer (디지털 프린터의 보안기능 시험/평가방법론 개발)

  • Cho, Young-Jun;Lee, Kwang-Woo;Cho, Sung-Kyu;Park, Hyun-Sang;Lee, Hyoung-Seob;Lee, Hyun-Seung;Kim, Song-Yi;Cha, Wook-Jae;Jeon, Woong-Ryul;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.16C no.4
    • /
    • pp.461-476
    • /
    • 2009
  • Digital Printers that are mainly used in enterprises and public institutions are compound machinery and tools which are combined into various functions such as printing, copying, scanning, and fax so on. Digital Printers has security functionality for protecting the important data related with confidential industry technology from leaking. According to the trends, CC(Common Criteria) evaluation and assurance about digital printer is on progress in Japan and USA. Domestically CC evaluation and assurance is started recently. However, the know-how about the digital printer evaluation is not enough and the developers and the evaluators have difficulty in CC evaluation of digital printer products in the country. Therefore, the testing method of digital printer security functionality and evaluation technology is essentially needed for increasing demand for the evaluation afterwards. In this study, we analyze the security functionality and developing trends of digital printer products from internal and external major digital printer companies. Moreover, we research the characters of each security functions and propose guideline for digital printer security functionality evaluation and vulnerability testing methods.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

Implementation of Security Information and Event Management for Realtime Anomaly Detection and Visualization (실시간 이상 행위 탐지 및 시각화 작업을 위한 보안 정보 관리 시스템 구현)

  • Kim, Nam Gyun;Park, Sang Seon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.303-314
    • /
    • 2018
  • In the past few years, government agencies and corporations have succumbed to stealthy, tailored cyberattacks designed to exploit vulnerabilities, disrupt operations and steal valuable information. Security Information and Event Management (SIEM) is useful tool for cyberattacks. SIEM solutions are available in the market but they are too expensive and difficult to use. Then we implemented basic SIEM functions to research and development for future security solutions. We focus on collection, aggregation and analysis of real-time logs from host. This tool allows parsing and search of log data for forensics. Beyond just log management it uses intrusion detection and prioritize of security events inform and support alerting to user. We select Elastic Stack to process and visualization of these security informations. Elastic Stack is a very useful tool for finding information from large data, identifying correlations and creating rich visualizations for monitoring. We suggested using vulnerability check results on our SIEM. We have attacked to the host and got real time user activity for monitoring, alerting and security auditing based this security information management.

Protective plan by the drone development in Major National Facilities (무인항공기 발전에 따른 국가중요시설 보호방안)

  • Cho, Min Sang;Shin, Seung Gyoon
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.3-9
    • /
    • 2015
  • With the development of technology, small UAVs are used in various forms. From military UAV to the Amazon drone, the UAVs are applied to increasing fields for its merits which can replace human work more fast and precisely than what human used to do. Yet, the use and development of UAVs cannot be embraced indiscreetly. There exist negative aspects along with its convenience and positive use. In military use, for instance, the use of UAV can handle dangerous missions in place of human beings but at the same time, it can be very threatening weapons that put people in danger of being attacked at unknown time and places. Therefore, this study discusses the safety measures for major national facilities. Through theoretical understanding of UAVs and major national facilities, the study explores into key concepts and reviewed the cases that threatened our nation's safety. The study also makes suggestions on the policies of the use of UAV to secure national safety.

Requirements Engineering & Management by the Object Oriented Methodology in the Weapon system (객체 지향적 방법론을 활용한 무기체계 요구사항 관리)

  • Choi, Sung Kyu;Choi, Eun Ha
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.55-62
    • /
    • 2013
  • System engineering is critical in today's industry and requirements engineering is an important stage of overall process. Requirements Engineering is the initial step of system development activity in which the requirements from the customer are elicited and documented. This activity is very much vital for the success of the project because all of activities depends upon requirements engineering such as designing, implementation, testing, operation and maintenance. The development process begins by clarifying the need and then articulating the need as a high level solution. In order to minimize the poor requirements and to sure successful projects, Object-Oriented requirements engineering was proposed. Object-Oriented requirements engineering is an approach to encapsulating information about the process and product, as well as functionality in to a requirements object. This paper proposes using the concept of an Operations Concept Harbinger(OCH) that is the prototype of Object-Oriented requirements engineering to develop the requirements with consolidating simultaneously the opinions of various stakeholder in the customer level and trace accurately the transition from User needs to requirements. Then the customer can secure the accurate requirements to meet their needs and traceability from user needs to requirements.

A Determination of the Factors Contributing to Internet Banking (인터넷뱅킹 요인 결정에 대한 연구)

  • John, Yongjean
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.137-144
    • /
    • 2012
  • Seventeen domestic banks, Hongkong & Shanghai Banking Corporation Ltd. and Korea Post provide their subscribers with banking services such as statement service, funds transfer, and application for loans through Internet banking sites, which have become ever-increasing banking services for individual and corporation and government subscribers. First, this study aimed at presenting a process of determining factors to measure customers' perception while using Internet banking for doing transactions. Secondly, this paper attempted to unveil a list of major factors that Internet banking customers perceive while accessing the web sites to do their business with their banks. This study also suggested the features of those factors, which would help improve our understanding of Web usage for Internet banking. This result of the paper will lead further understanding of factors associated with Internet uses in other economic activities, which enable practitioners such as web designers and security specialists to provide Internet banking subscribers with better services in a safe and convenient web pages.

Stacked Sparse Autoencoder-DeepCNN Model Trained on CICIDS2017 Dataset for Network Intrusion Detection (네트워크 침입 탐지를 위해 CICIDS2017 데이터셋으로 학습한 Stacked Sparse Autoencoder-DeepCNN 모델)

  • Lee, Jong-Hwa;Kim, Jong-Wouk;Choi, Mi-Jung
    • KNOM Review
    • /
    • v.24 no.2
    • /
    • pp.24-34
    • /
    • 2021
  • Service providers using edge computing provide a high level of service. As a result, devices store important information in inner storage and have become a target of the latest cyberattacks, which are more difficult to detect. Although experts use a security system such as intrusion detection systems, the existing intrusion systems have low detection accuracy. Therefore, in this paper, we proposed a machine learning model for more accurate intrusion detections of devices in edge computing. The proposed model is a hybrid model that combines a stacked sparse autoencoder (SSAE) and a convolutional neural network (CNN) to extract important feature vectors from the input data using sparsity constraints. To find the optimal model, we compared and analyzed the performance as adjusting the sparsity coefficient of SSAE. As a result, the model showed the highest accuracy as a 96.9% using the sparsity constraints. Therefore, the model showed the highest performance when model trains only important features.

A Study on Efficient Network Design Scheme for Link-16 Tactical Networks (네트워크 중심전을 위한 LINK-16 시스템에서의 효율적인 네트워크 설계방안 연구)

  • Jang, Jae-Hyeong;Choe, Hyeong-Uk;Jeong, Seung-Seop;Kim, Yeong-Beom
    • 한국ITS학회:학술대회논문집
    • /
    • 2008.11a
    • /
    • pp.118-121
    • /
    • 2008
  • 본 연구에서는 정보통신기술을 활용한 미래전 개념인 네트워크 중심전 (NCW: Network Centric Warfare) 수행에 있어서 세계적으로 가장 널리 쓰이고 있는 Link-16의 기술적 요소들을 물리계층, 데이터링크 계층, 응용계층(전술메시지교환) 측면에서 검토하고 작전 운용 측면에서 Link-16 만의 장점과 한계점을 도출해 보기로 한다. 특히, 군용 전술 네트워크인 Link-16의 경우 통신 보안 및 견고성에 시스템 설계상의 주안점이 주어지기 때문에 비록 낮은 전송속도이지만 Link-16의 전송용량의 적절한 분배와 활용 방안은 매우 중요한 문제이다. 본 연구에서는 Link-16의 타임슬롯 구조, NPG 개념, 멀티네팅 개념을 기반으로 주요 작전을 수행하는데 있어서 네트워크 참가요소 (지상 및 공중 플랫폼)에 효율적인 전송용량 배분을 하기 방안을 제시한다. 여기에 있어서 고려해야 할 요소들로는 불필요한 통신용량할당의 최소화, 네트워크 설계 과정의 간소화, 작전 목적에 대한 충분한 지원, 보안성 유지 등을 들 수 있다.

  • PDF