• Title/Summary/Keyword: 통합보안검색

Search Result 38, Processing Time 0.023 seconds

A Study on implementation model for security log analysis system using Big Data platform (빅데이터 플랫폼을 이용한 보안로그 분석 시스템 구현 모델 연구)

  • Han, Ki-Hyoung;Jeong, Hyung-Jong;Lee, Doog-Sik;Chae, Myung-Hui;Yoon, Cheol-Hee;Noh, Kyoo-Sung
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.351-359
    • /
    • 2014
  • The log data generated by security equipment have been synthetically analyzed on the ESM(Enterprise Security Management) base so far, but due to its limitations of the capacity and processing performance, it is not suited for big data processing. Therefore the another way of technology on the big data platform is necessary. Big Data platform can achieve a large amount of data collection, storage, processing, retrieval, analysis, and visualization by using Hadoop Ecosystem. Currently ESM technology has developed in the way of SIEM (Security Information & Event Management) technology, and to implement security technology in SIEM way, Big Data platform technology is essential that can handle large log data which occurs in the current security devices. In this paper, we have a big data platform Hadoop Ecosystem technology for analyzing the security log for sure how to implement the system model is studied.

Distributed RFID Information Service Architecture for Ubiquitous Logistics (유비쿼터스 물류를 위한 EPC기반 RFID 정보서비스 구조)

  • Lee, Jae-Won;Lee, Yeong-Gu
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.05a
    • /
    • pp.139-148
    • /
    • 2005
  • EPC를 탑재한 RFID 형태의 스마트객체를 이용한 물류 시스템을 구축하기 위해서는 시스템 구성 요소간의 거래에 필수적인 RFID 객체의 PML 데이터를 표현하고 검색요구에 대응하는 RFID 정보서비스의 설계 및 관리가 매우 중요하다. EPC기반 RFID 정보서비스는 네트워크상의 정보시스템들에 보안과 운영의 이유로 분산되어 있는 RFID 객체 정보들을 검색하여 사용자가 요구하는 결과를 반환하는 역할을 담당한다. 하지만 RFID 객체 정보의 표준화된 표현과 처리, 그리고 분산처리로 인한 통신량과 처리시간과다의 문제가 존재한다. 이에 대해서 본 연구는 물류시스템의 PML 데이터의 표현 및 사용, 검색패턴을 분석하고, 분석 결과를 기반으로 미들웨어를 이용하는 분산형 RFID 객체 데이터 관리 및 RFID 객체 정보서비스 구조를 설계하고 제시하였다. 단일형 및 통합형 RFID 정보서비스 구조를 제시하였다.

  • PDF

A Secure Communication Framework for the Detection System of Network Vulnerability Scan Attacks (네트워크 취약점 검색공격 탐지 시스템을 위한 안전한 통신 프레임워크 설계)

  • You, Il-Sun;Kim, Jong-Eun;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.1-10
    • /
    • 2003
  • In this paper, we propose a secure communication framework for interaction and information sharing between a server and agents in DS-NVSA(Detection System of Network Vulnerability Scan Attacks) proposed in〔1〕. For the scalability and interoperability with other detection systems, we design the proposed IDMEF and IAP that have been drafted by IDWG. We adapt IDMEF and IAP to the proposed framework and provide SKTLS(Symmetric Key based Transport Layer Security Protocol) for the network environment that cannot afford to support public-key infrastructure. Our framework provides the reusability of heterogeneous intrusion detection systems and enables the scope of intrusion detection to be extended. Also it can be used as a framework for ESM(Enterprise Security Management) system.

Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information) (PC보안솔루션 로그분석을 통한 보안정책 제안 (개인정보유출 방지))

  • Chae, Hyun Tak;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.961-968
    • /
    • 2014
  • In order to prevent leakage of personal information by insiders a large number of companies install pc security solutions like DRM(Digital Right Management), DLP(Data Loss Prevention), Personal information filtering software steadily. However, despite these investments anomalies personal information occurred. To establish proper security policy before implementing pc security solutions, companies can prevent personal information leakage. Furthermore by analyzing the log from the solutions, companies verify the policies implemented effectively and modify security policies. In this paper, we define the required security solutions installed on PC to prevent disclosure of personal information in a variety of PC security solution, plan to integrate operations of the solutions in the blocking personal information leakage point of view and propose security policies through PC security solution log analysis.

A Study of Software Architecture Design Methods for Multiple Access Con trol under Web-based Medical Information System Environment (웹 기반 의료정보시스템 다중 접근제어를 위한 소프트웨어아키텍쳐 설계방법)

  • Noh, Si-Choon;Hwang, Jeong-Hee
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.43-49
    • /
    • 2011
  • Web-based health information provides a lot of conveniences, however the security vulnerabilities that appear in the network environment without the risk of exposure in the use of information are growing. Web-based medical information security issues when accessing only the technology advances, without attempting to seek a safe methodology are to increase the threat element. So it is required. to take advantage of web-based information security measures as a web-based access control security mechanism-based design. This paper is based on software architecture, design, ideas and health information systems were designed based on access control security mechanism. The methodologies are to derive a new design procedure, to design architecture and algorithms that make the mechanism functio n. To accomplish this goal, web-based access control for multiple patient information architecture infrastructures is needed. For this software framework to derive features that make the mechanism was derived based on the structure. The proposed system utilizes medical information, medical information when designing an application user retrieves data in real time, while ensuring integration of encrypted information under the access control algorithms, ensuring the safety management system design.

Data Management in Mobile Environments (모바일 환경에서의 데이터 관리)

  • Lee, Eun-Jae;Kim, Jai-Hoon;Kim, Chi-Ha
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.165-168
    • /
    • 2010
  • 모바일시장의 흐름이 피쳐폰에서 스마트폰으로 넘어가는 과도기적인 시점에서 하드웨어 기술은 크게 발달했지만, 사용자가 주소록이나 발신자정보표시서비스 등의 여러 정보들을 통합 활용함에 있어서 사용자 중심적인 애플리케이션 제작에는 부족함이 있다. 본 논문에서는 스마트폰의 다양한 하드웨어 기능(GPS, wifi, 등)들을 이용하여 기존 피쳐폰에서 사용되어지던 다양한 정보들을 효율적으로 통합하여 활용할 수 있는 방안(통화 수신자 정보 자동검색 등)에 대해 제시하고, 오픈소스의 장점을 갖고 있는 안드로이드 기반의 스마트폰에 설계하였다.

Mobile Object Security in Distributed Object Environment (분산객체 환경에서의 이동객체 보안)

  • Hong, Seong-Pyo;Song, Gi-Beom;Lee, Chiol-Seong;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.893-898
    • /
    • 2002
  • Integration with CORBA and mobile agent is improving various kinds problems that are happening in distributed system. This technology is guarantee the interoperability to other agent platforms and extend the mobile agent system but appears various kinds problems of suity. In this paper, we propose the mobile agent security system that is based on CORBA security service specification and MASIF. Since Proposed system is based on CORBA and MASIF, it is extend the large scale of distributed system and interoperable with other agent platforms.

  • PDF

Study of Digital Content Integrated Model for Massive Multimedia User (대용량 멀티미디어 사용자를 위한 디지털 콘텐츠 통합모델에 관한 연구)

  • Lim Yong-Muk;Park Sang-Cho;Kim Hee-Nam;Kim Young-Deuk;Kim Woo-Sung;Oh Soo-Hyun;Oh Yong-Sun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.352-356
    • /
    • 2005
  • Content management, distribution system and DRM technology have been developed respectively, many contents services are more focused on the system like stability of distribution system or contents security than user-orient. In this paper, we would suggest multimedia contents management based on DRM and distribution model for the users of massive multimedia. The suggested model will be a total solution of content management, DRM and Watermarking functions as well as it will offer convenience to the users with Indexing DBMS which is focused on users.

  • PDF

Geospatial Data Catalogue Service ; Status and Issues

  • Chang, Eun-Mi
    • Spatial Information Research
    • /
    • v.17 no.4
    • /
    • pp.463-468
    • /
    • 2009
  • Geospatial interoperability has been pursued by propagating international standards and OGC standards. The NGIC, GeoConnection and other catalogue services are reviewed with aspect to metadata and search functions. Detailed metadata could be driven to users after finding what they want to have. Criteria for search were not fully overlapped with metadata, as simple and typical searches are prevailing. OGC catalogue service standards were made but catalogue services in Korea have been implemented in their own ways, not fully compliance-tested. Different domain technologies have been developed regardless of geospatial service, the relationship and integration methods between catalogue services and other core technologies are reviewed in the form of a pair table. Other issues in geospatial service were discussed in the level of raising issues.

  • PDF

A Study on the Real-time Travel Information Service System Model in Ubiquitous Environment (유비쿼터스 환경에서 실시간 여행정보 서비스 시스템 모델 연구)

  • 강기순;윤용익
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2004.03a
    • /
    • pp.39-43
    • /
    • 2004
  • 최근 유무선 인터넷의 급성장과 유비쿼터스라는 용어의 등장으로 새로운 인터넷 비즈니스 모델에 많은 관심을 두고 있다. 본 논문에서는 유비쿼터스 환경을 수반한 유. 무선 인터넷 비즈니스 모델 분야 중 실시간 여행정보 서비스 시스템을 제안하고자 한다. 기존의 여행정보 서비스는 각 시,도 구청에서 운영하고 있는 관광안내소에서의 인적 서비스, 책이나 팜플렛 등에 의한 문헌정보 서비스, 인터넷 홈페이지를 통한 웹 서비스로 분류되어 있다. 그러나 이러한 여행정보들을 이용하려면 사용자가 스스로 여행안내 책자나 인터넷에 접속하여 자신에 맞는 정보를 스스로 검색하여야 하므로 실시간 여행정보를 받아보기란 어려웠다. 본 논문에서 제안하고자 하는 실시간 여행정보 서비스 시스템은 기존 여행정보 서비스의 문제점을 보안하고 통합하여 사용자의 요건에 맞는 여행정보를 정확한 시간, 정확한 장소로 실시간 서비스 해 주는 것을 목적으로 한다.

  • PDF