• Title/Summary/Keyword: 융합대응계층

Search Result 33, Processing Time 0.026 seconds

Next Generation Convergence Security Framework for Advanced Persistent Threat (지능형 지속 위협에 대한 차세대 융합 보안 프레임워크)

  • Lee, Moongoo;Bae, Chunsock
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.92-99
    • /
    • 2013
  • As a recent cyber attack has a characteristic that is intellectual, advanced, and complicated attack against precise purpose and specified object, it becomes extremely hard to recognize or respond when accidents happen. Since a scale of damage is very large, a corresponding system about this situation is urgent in national aspect. Existing data center or integration security framework of computer lab is evaluated to be a behind system when it corresponds to cyber attack. Therefore, this study suggests a better sophisticated next generation convergence security framework in order to prevent from attacks based on advanced persistent threat. Suggested next generation convergence security framework is designed to have preemptive responses possibly against APT attack consisting of five hierarchical steps in domain security layer, domain connection layer, action visibility layer, action control layer and convergence correspondence layer. In domain connection layer suggests security instruction and direction in domain of administration, physical and technical security. Domain security layer have consistency of status information among security domain. A visibility layer of Intellectual attack action consists of data gathering, comparison, decision, lifespan cycle. Action visibility layer is a layer to control visibility action. Lastly, convergence correspond layer suggests a corresponding system of before and after APT attack. An introduction of suggested next generation convergence security framework will execute a better improved security control about continuous, intellectual security threat.

A Method for Deriving a Security Threat Response System in Smart Factory Area and Layer (스마트팩토리 영역 및 계층별 보안위협 대응체계 도출 기법)

  • In-Su Jung;Deuk-Hun Kim;Jin Kwak
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.187-189
    • /
    • 2023
  • IoT(Internet of Things), 빅데이터, AI(Artificial Intelligence), 클라우드와 같은 ICT(Information and Communications Technology) 기술이 발전함에 따라 ICT와 제조기술이 융합된 스마트팩토리가 발전하고 있다. 이는 2개의 영역과 5개의 계층으로 구성되어 기타 환경들과 상이한 구조를 가지고 있으며, 각 영역·계층별 발생 가능한 보안위협도 상이하다. 또한, 각 영역과 계층이 연결됨에 따라 발생 가능한 보안위협이 증가하고 있으며, 이에 대한 효율적인 대응을 위하여 스마트팩토리 영역·계층별 환경을 고려한 대응체계 마련이 필요한 실정이다. 따라서, 본 논문에서는 스마트팩토리 영역·계층별 발생 가능한 보안위협을 분석하고, 이에 대응하기 위한 대응체계 도출 기법을 제안한다.

A Study on the Improvement of Security Threat Analysis and Response Technology by IoT Layer (IoT 계층별 보안위협 분석 및 대응기술 개선 방안 연구)

  • Won, Jong-Hyuk;Hong, Jung-Wan;You, Yen-Yoo
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.149-157
    • /
    • 2018
  • In this paper, we propose an attack detection technology using SDN Controller to study security threats in IoT environment. The research methodology has been developed by applying IoT security threat management technology to the IoT layer and analyzing the research trend of applied security technology. The study results show that the effectiveness of the detection method using the sampling method is studied by adding OpenFlow based SDN Controller to the network switch equipment of the existing IoT network. This method can detect the monitoring and attack of the whole network by interworking with IDS and IPS without affecting the performance of existing IoT devices. By applying such improved security threat countermeasure technology, we expect to be able to relieve anxiety of IoT security threat and increase service reliability.

Architecture for Integrated Processing and Managing Smart Factory IT and OT Area Data (스마트팩토리 IT 및 OT 영역 내 보안위협 관련 데이터 통합 처리 및 관리 아키텍처)

  • In-Su Jung;Deuk-Hun Kim;Jin Kwak
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.158-161
    • /
    • 2023
  • 스마트팩토리는 기존 제조산업과 ICT(Information & Communication Technology)가 융합된 지능형 공장이다. 이는 직접적인 제조공정 과정이 수행되는 OT(Operational Technology) 영역(0~3계층)과 전사업무 관리를 수행하는 IT(Information Technology) 영역(4~5계층)으로 구분되며, 각 영역과 계층이 연결되어 제조·물류·유통 과정의 자동화 및 지능화를 제공한다. 그러나 각 영역과 계층이 연결됨에 따라 보안위협 벡터가 증가하고 있으며, 다영역·다계층 환경인 스마트팩토리에 적합한 대응체계 연구를 위해 영역별 보안위협 관련 데이터를 통합하여 처리 및 관리하는 아키텍처 연구가 필요한 실정이다. 이에 따라 본 논문에서는 스마트팩토리 환경 내 IT 및 OT 영역 장치를 식별하고 보안위협 관련 데이터 통합 처리 및 관리를 위한 아키텍처를 제안한다.

Design of a Static ARP Table Management xApp for an E2 Interface Security in Open RAN (Open RAN에서의 E2 인터페이스 보호를 위한 정적 ARP 테이블 관리 xApp 설계)

  • Jihye Kim;Jaehyoung Park;Jong-Hyouk Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.381-382
    • /
    • 2024
  • Open RAN(Radio Access Network)을 선도적으로 연구하고 있는 O-RAN Alliance에서는 Open RAN의 E2 인터페이스에서 발생 가능한 보안 위협 중 하나로 MitM(Man-in-the-Middle) 공격을 명시하였다. 그러나 이에 대응하기 위한 보안 요구사항으로는 3계층 보안 프로토콜인 IPsec 사용을 명시하고 있으며, 2계층 공격인 ARP(Address Resolution Protocol) 스푸핑에 대한 요구사항은 명시하고 있지 않다. 따라서 본 논문에서는 MitM 공격 중 하나인 ARP 스푸핑으로부터 E2 인터페이스를 보호하기 위해, Near-RT RIC의 ARP 테이블에서 E2 인터페이스로 연결되는 장비에 대한 MAC 주소를 정적으로 설정할 수 있는 xApp을 제안한다.

A Study on Cybersecurity Data Sharing System Model with a Hierarchical Structure for Effective Data Sharing (효과적인 데이터 공유를 위한 계층적 구조를 갖는 사이버 보안 데이터 공유시스템 모델 연구)

  • Ho-jei Yu;Chan-hee Kim;Ye-rim Cho;Sung-sik Im;Soo-hyun Oh
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.39-54
    • /
    • 2022
  • Recently, the importance of collecting, analyzing, and real-time sharing of various cybersecurity data has emerged in order to effectively respond to intelligent and advanced cyber threats. To cope with this situation, Korea is making efforts to expand its cybersecurity data sharing system, but many private companies are unable to participate in the cybersecurity data sharing system due to a lack of budget and professionals to collect cybersecurity data. In order to solve such problems, this paper analyzes the research and development trends of existing domestic and foreign cyber security data sharing systems, and based on that, propose a cybersecurity data sharing system model with a hierarchical structure that considers the size of the organization and a step-by-step security policy that can be applied to the model. In the case of applying the model proposed in this paper, it is expected that various private companies can expand their participation in cybersecurity data sharing systems and use them to prepare a response system to respond quickly to intelligent security threats.

A Study on the Use of Grid-based Spatial Information for Response to Typhoons (태풍대응을 위한 격자 기반 공간정보 활용방안 연구)

  • Hwang, Byungju;Lee, Junwoo;Kim, Dongeun;Kim, Jangwook
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.25-38
    • /
    • 2021
  • Purpose: To reduce the damage caused by continuously occurring typhoons, we proposed a standardized grid so that it could be actively utilized in the prevention and preparation stage of typhoon response. We established grid-based convergence information on the typhoon risk area so that we showed the effectiveness of information used in disaster response. Method: To generate convergent information on typhoon hazard areas that can be useful in responding to typhoon situation, we used various types of data such as vector and raster to establish typhoon hazard area small grid-based information. A standardized grid model was applied for compatibility with already produced information and for compatibility of grid information generated by each local government. Result: By applying the grid system of National branch license plates, a grid of typhoon risk areas in Seoul was constructed that can be usefully used when responding to typhoon situations. The grid system of National branch license plates defines the grid size of a multi-dimensional hierarchical structure. And a grid of typhoon risk areas in Seoul was constructed using grids of 100m and 1,000m. Conclusion: Using real-time 5km resolution grid based weather information provided by Korea Meteorological Administration, in the future, it is possible to derive near-future typhoon hazard areas according to typhoon travel route prediction. In addition, the national branch number grid system can be expanded to global grid systems for global response to various disasters.

Analysis of the Interrelations among Perceptions of Satisfaction with Service in the Users of Sports Facilities (체육시설 이용객의 서비스 만족도 인식간 상호관계 분석)

  • Lee, Yang-Gu
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.337-344
    • /
    • 2018
  • This study aims to provide the basic data for the revitalization, efficient operation and management of sports facilities by investigating the perceptions of the service satisfaction in the users of public sports facilities. As the subjects of this study, 225 residents in the Chungbuk region were selected regardless of their sexes, and correspondence analysis method was applied to examine the interrelations among perceptions in the users of public sports facilities. The findings obtained through the research results are summarized as follows: First, it is necessary to construct and improve public sports facilities for the efficiency of their operation and the reflection of the users' demand for service satisfaction. Second, it is necessary to approach from the welfare aspect in the plan for the utilization of public sports facilities and to develop and provide various activity programs for the consumers' classes.

A Study on Direction of University Safety Management Policy by AHP Analysis (AHP 분석을 통한 대학안전관리정책 방향에 대한 연구)

  • Jaeshin Seo;Taekeun Oh
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.511-517
    • /
    • 2023
  • Universities are subject to various safety laws and regulations and practical measures are needed to properly implement them. In order to improve safety management through response to each law, intensive management is required by having an organization and professional personnel in charge, but it is financially difficult to appropriately allocate personnel to respond to laws. Therefore, in this study, necessary safety management policy items were set to reflect the requirements of major laws related to university safety, and a reasonable safety management plan was proposed through the AHP for priorities.

The Design of A HPC based System For Responding Complex Disaster (복합재난 대응을 위한 HPC 기반 시스템 설계)

  • Kang, Kyung-woo;Kang, Yun-hee
    • Journal of Platform Technology
    • /
    • v.6 no.4
    • /
    • pp.49-58
    • /
    • 2018
  • Complex disasters make greater damage and higher losses unexpected than the past. To prevent these disasters, it needs to prepare a plan for handling unexpected results. Especially an accident at a facility like an atomic power plant makes a big problem cause of climate change. A simulation needs to do preliminary researches based on diverse situations. In this research we define the basic component techniques to design and implement the disaster management system. Basically a hierarchical system design method is to build on the resources provided from high performance computing(HPC) and large-scale storage systems. To develop the system, it is considered middleware as well as application studies, data studies and decision making services in convergence areas.