• Title/Summary/Keyword: 취약점 진단

Search Result 93, Processing Time 0.024 seconds

Multi-level Protection Infrastructure for Virus Protection (다단계 바이러스 차단 구조 연구)

  • 노시춘;김귀남
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.187-198
    • /
    • 2004
  • Virus protection infrastructure management is network infrastructure management, traffic route management, virus protection zone expansion, and virus protection management for gateway area. This research paper provides a diagnosis of characteristics and weaknesses of the structure of existing virus protection infrastructure, and recommends an improved multi-level virus protection infrastructure as a measure for correcting these weaknesses. Unproved virus protection infrastructure fitters unnecessary mail at the gateway stage to reduce the toad on server. As a result, number of transmission accumulation decreases due to the reduction in the CPU load on the Virus wall and increase in virus treatment rate.

  • PDF

A study on an Infrastructure for Virus Protection (바이러스 차단 인프라 구조에 관한 연구)

  • Noh, Si-Choon;Kim, Su-Hee;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.53-62
    • /
    • 2005
  • Virus protection infrastructure managementis network infrastructure management, traffic route management, virus protection zone expansion, and virus protection management for gateway area. This research paper provides a diagnosis of characteristics and weaknesses of the structure of existing virus protection infrastructure, and recommends an improved multi-level virus protection infrastructure as a measure for correcting these weaknesses. Improved virus protection infrastructure filters unnecessary mail at the gateway stage to reduce the load on server. As a result, numberof transmission accumulation decreases due to the reduction in the CPU load on the Virus wall and increase in virus treatment rate.

  • PDF

Effective malware countermeasures in enterprise environments (기업환경에서의 효율적인 악성코드 대응 방안)

  • Yu, Da Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.683-685
    • /
    • 2015
  • 이메일 등 외부로부터 유입된 악성코드로 인해 기업환경 사용자들의 피해 사례가 증가하고 있다. 대다수 기업환경 사용자들은 시그니처 기반의 안티바이러스를 설치하여 사용하고 있지만 신종 악성코드에 대한 대응률은 낮다. 또, 신종 악성코드 샘플을 수집하더라도 분석하고 시그니처 데이터베이스에 적용하는데 많은 시간이 소요되어 반영되기 전까지 사용자는 신종 악성코드를 진단하지 못하는 취약점을 가지게 된다. 최근 클라우드컴퓨팅 기술이 활성화되면서 안티바이러스에 응용하여 적용하고 있다. 방대한 데이터베이스 및 빠른 질의응답을 토대로 클라우드 기반의 안티바이러스는 시그니처 기반의 안티바이러스를 대체할 기술로 떠오르고 있다. 본 논문은 클라우드컴퓨팅 기술을 이용한 안티바이러스를 기업 환경에 적용하여 효율적으로 악성코드 대응을 할 수 있도록 제안하고자 한다.

Validation Plan of Android applications (안드로이드 어플리케이션의 진본 검증 방안)

  • Han, Kyu-cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.415-417
    • /
    • 2015
  • 스마트폰이 출시된 이후 지금까지 개발된 안드로이드 앱은 초기 앱 자체의 문제가 있었으나 스마트폰 시장이 점차 확대 되면서 개발된 안드로이드 앱의 보안 취약점과 악성코드가 삽입된 어플리케이션의 .apk 파일 배포로 인해 무결성이 지켜지지 못하고 보안 문제가 끊임없이 발생하며 안드로이드폰에 설치된 앱의 위 변조로 악성코드가 삽입된 APK 파일을 이용해 설치하였을 경우 소스코드의 부정 사용과 개인정보유출 등 2 차로 금융사기 유도, 소액결재 등 사회적인 문제가 되고 있다. 본 논문은 위 변조된 안드로이드 어플리케이션의 진본 여부를 확인하 위해 방안을 제안하며 악의적인 목적으로 만들어진 위 변조된 안드로이드 어플리케이션 apk 파일을 이용한 설치로 부정 사용되는 안드로이드 어플리케이션의 진본 설치 여부를 진단할 수 있는 방안을 제안하고자 한다.

Evaluation of Software Diagnostics for Secure Operational Environment in Nuclear I&C systems (원전 계측제어 시스템 보안성환경을 위한 진단기능 평가)

  • Yoo, Sung Goo;Seul, Namo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.8
    • /
    • pp.107-112
    • /
    • 2016
  • Safety Critical Instrumentation and Control Systems perform those functions to maintain nuclear power plants' parameters within acceptable limits established for a design basis events and anticipated operating occurrence to ensure safety function. Those digitalized systems shall protect inadvertent and non-malicious behavior to ensure the reliable operation of systems, known as a Secure Development and Operational Environment(SDOE). SDOE would be established through managerial and technical controls. The objective of this paper is to evaluate the effectiveness of Cyclic Redundancy Checksum diagnostic, which is one of technical controls for SDOE, that can confirm the integrity of software of I&C systems to establish the secure environment. The results of this assessment would be the practical implementation of design and safety review of nuclear I&C systems.

Cost-Effective, Real-Time Web Application Software Security Vulnerability Test Based on Risk Management (위험관리 기반의 비용 효율적인 실시간 웹 애플리케이션 소프트웨어 보안취약점 테스팅)

  • Kumi, Sandra;Lim, ChaeHo;Lee, SangGon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.59-74
    • /
    • 2020
  • The web space where web applications run is the cyber information warfare of attackers and defenders due to the open HTML. In the cyber attack space, about 84% of worldwide attacks exploit vulnerabilities in web applications and software. It is very difficult to detect web vulnerability attacks with security products such as web firewalls, and high labor costs are required for security verification and assurance of web applications. Therefore, rapid vulnerability detection and response in web space by automated software is a key and effective cyber attack defense strategy. In this paper, we establish a security risk management model by intensively analyzing security threats against web applications and software, and propose a method to effectively diagnose web and application vulnerabilities. The testing results on the commercial service are analyzed to prove that our approach is more effective than the other existing methods.

Research on Diagnosis of Regional Science Culture and Plans for Improvement: Exploratory Case Study of Gyeonggi Region, Korea (지역 과학문화 현황 진단과 개선방안: 경기도 지역에 대한 탐색적 사례연구를 중심으로)

  • Lee, Jihoon;Lee, Yeonhee
    • Journal of Korea Technology Innovation Society
    • /
    • v.16 no.1
    • /
    • pp.230-251
    • /
    • 2013
  • This research aims to diagnosis regional science as culture and propose plans for improvement. The study was performed based on a framework for analyses presented by existing literatures. Science culture is divided into two dimensions(individual and social), Each dimension is expected to represent citizen literacy of and regional infrastructure of science culture respectively. Gyeonggi region of Korean metropolitan area has been analyzed for the case study. As a result of the case study, the level of science culture of Gyeonggi region is weak compared with others areas. To improve, we propose some plans such as budget extension, long-term view on investments, strengthen network and organizational system for regional science culture.

  • PDF

A Study on Models for Technical Security Maturity Level Based on SSE-CMM (SSE-CMM 기반 기술적 보안 성숙도 수준 측정 모델 연구)

  • Kim, Jeom Goo;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.25-31
    • /
    • 2012
  • The SSE-CMM model is how to verify the level of information protection as a process-centric information security products, systems and services to develop the ability to assess the organization's development. The CMM is a model for software developers the ability to assess the development of the entire organization, improving the model's maturity level measuring. However, this method of security engineering process improvement and the ability to asses s the individual rather than organizational level to evaluate the ability of the processes are stopped. In this research project based on their existing research information from the technical point of view is to define the maturity level of protection. How to diagnose an information security vulnerabilities, technical security system, verification, and implementation of technical security shall consist of diagnostic status. The proposed methodology, the scope of the work place and the current state of information systems at the level of vulnerability, status, information protection are implemented to assess the level of satisfaction and function. It is possible that measures to improve information security evaluation based on established reference model as a basis for improving information security by utilizing leverage.

Real-time hacking, detection and tracking ICT Convergence Security Solutions Test and Evaluation (실시간 해킹, 탐지 및 추적관리 ICT 융합 보안 솔루션 시험평가)

  • Kim, Seung-Bum;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.235-246
    • /
    • 2015
  • Understanding the various unspecified hacking and repeated cyber DDoS attacks, finally was able to find a solution in the methods of attacks. Freely researching approach that combines the attacker and defender, offensive and defensive techniques can be called a challenge to discover the potential in whimsy. In this paper we test and evaluate "KWON-GA", global white hackers team has made by many years of experiences in infiltration and diagnosis under guise of offence is the best defence. And it is knowledge information ICT Convergence security solution which is developed for the purpose of defence, it provide customization policy that can be fit to customer's system environment with needed techniques and it is processed with unique proprietary technology so that it's not possible to scan. And even if it has leaked internally it's impossible to analyze so hackers can't analyze vulnerability, also it can't be abused as hacking tools.

An Improvement of the Guideline of Secure Software Development for Korea E-Government (대한민국 전자정부 소프트웨어 개발보안 가이드 개선 방안 연구)

  • Han, Kyung Sook;Kim, Taehwan;Han, Ki Young;Lim, Jae Myung;Pyo, Changwoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1179-1189
    • /
    • 2012
  • We propose an improvement on the Guideline of Secure Software Development for Korea e-Government that is under revision by the Ministry of Public Administration and Security in 2012. We adopted a rule-oriented organization instead shifting from the current weakness-oriented one. The correspondence between the weakness and coding rules is identified. Also, added is the coverage of diagnostic tools over the rules to facilitate the usage by programmers during coding period When the proposed guideline is applied to secure software development, the weakness would be controlled indirectly by enforcing coding rules. Programmers responsibility would be limited to the compliance of the rules, while the current version implies that it is programmers responsibility to guarantee being free from the weakness, which is hard to achieve at reasonable cost.