• Title/Summary/Keyword: 패킷 보호

Search Result 274, Processing Time 0.033 seconds

Development of Integrated Security Management Based on Cloaking IDS (내장 IDS기반의 통합 보안관리 시스템 개발)

  • Seung-Pyo Huh;Ye-Hwan Jeon;Jeom-Goo Kim
    • Annual Conference of KIPS
    • /
    • 2008.11a
    • /
    • pp.1417-1420
    • /
    • 2008
  • 본 연구에서는 서비스를 제공하는 각 서버들을 위협에서 보호하고 통합적으로 관리하기 위해 내장 IDS기반의 통합 보안관리 시스템을 개발하였다. IDS 서버를 외부망과 단절시킴으로써 IDS 서버에 대한 위협 자체를 원천적으로 차단하였고, 관리 대상 서버들에 에이전트를 탑재하여 탑재된 에이전트가 서버의 시스템 자원 및 네트워크 트래픽, 위협이 되는 패킷들의 자세한 정보를 수집, 분석하여 관리서버로 전송한다. 관리 프로그램은 비동기식의 X-Internet기술을 도입한 Adobe Flex를 사용한 웹 어플리케이션으로 개발하여 어떤 플랫폼에서도 접속하여 관리자의 역할을 수행할 수 있도록 하였다. 이와 같은 관리 프로그램을 통하여 대상 서버들의 시스템 자원 및 네트워크 트래픽들을 효율적으로 파악할 수 있고 IDS에서 탐지한 위협을 탐지 및 차단이 가능하도록 구현하였다.

HT-RR:Procedure for Improving authentication by CoTI and Binding information (HT-RR:CoTI와 직전 바인딩 정보를 이용한 바인딩 갱신 패킷의 인증 향상 기법)

  • Byun, Kyung-Hwan;Park, Min-Woo;Chung, Tai-Myoung
    • Annual Conference of KIPS
    • /
    • 2008.05a
    • /
    • pp.1155-1158
    • /
    • 2008
  • MIPv6(Mobile IPv6)는 이동노드(mobile node, MN)의 이동성(mobility)를 고려하여 만들어진 프로토콜로 이동노드와 상대노드(correspondent node, CN)간의 효율적인 통신을 위해 경로 최적화 기능을 제공하며, 이를 통해 두 노드가 홈 링크를 통하지 않고도 직접 통신할 수 있다. 이때 경로 최적화를 위해 바인딩 갱신(binding update)과정을 수행하며, MIPv6는 RR(return routability)를 통해 바인딩 갱신을 보호한다. 하지만 RR을 통한 바인딩 갱신은 거짓된 바인딩 갱신 공격에 취약하다. 본 논문에서는 RR과정의 취약점을 보완하는 HT-RR메커니즘을 제안한다.

A New Buffer Management Scheme using Weighted Dynamic Threshold for QoS Support in Fast Packet Switches with Shared Memories (공유 메모리형 패킷 교환기의 QoS 기능 지원을 위한 가중형 동적 임계치를 이용한 버퍼 관리기법에 관한 연구)

  • Kim Chang-Won;Kim Young-Beom
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.7 no.3
    • /
    • pp.136-142
    • /
    • 2006
  • Existing buffer management schemes for shared-memory output queueing switches can be classified into two types: In the first type, some constant amount of memory space is guaranteed to each virtual queue using static queue thresholds. The static threshold method (ST) belongs to this type. On the other hand, the second type of approach tries to maximize the buffer utilization in 머 locating buffer memories. The complete sharing (CS) method is classified into this type. In the case of CS, it is very hard to protect regular traffic from mis-behaving traffic flows while in the case of ST the thresholds can not be adjusted according to varying traffic conditions. In this paper, we propose a new buffer management method called weighted dynamic thresholds (WDT) which can process packet flows based on loss priorities for quality-of-service (QoS) functionalities with fairly high memory utilization factors. We verified the performance of the proposed scheme through computer simulations.

  • PDF

A Study on the 3D-Puzzle Security Policy in Integrated Security System Network (통합보안 시스템 망 내 3차원-Puzzle 보안정책에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.425-434
    • /
    • 2010
  • This study shows a limit to attacks that the prevention system, which is used as the mutual third aggressive packet path between open heterogeneous networks and applies prevention techniques according to the trace like IP tracking and attack methods, can prevent. Therefore, the study aims to learn information of constant attack routing protocol and of the path in network, the target of attack and build a database by encapsulating networks information routing protocol operates in order to prevent source attack paths. In addition, the study is conducted to divide network routing protocols developed from the process of dividing the various attack characters and prevent various attacks. This study is meaningful in that it analyzes attack path network and attacks of each routing protocol and secure exact mechanism for prevention by means of 3D-Puzzle, Path, and Cube of the integrated security system which is an implementation method of integrated information protection for access network defense.

Grid Noise Removal in Computed Radiography Images Using the Combined Wavelet Packet-Fourier Method (CR영상에서 웨이블릿 패킷-푸리에 방법을 이용한 그리드 잡음 제거)

  • Lee, A Young;Kim, Dong Youn
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.11
    • /
    • pp.175-182
    • /
    • 2012
  • The scattered radiation always occurs when X-ray strikes the object. To absorb the scattered X-rays, the antiscatter grids are used, however these grids images are superimposed in the projection radiography images. When those images are displayed on the monitor, moir$\acute{e}$ patterns are overlapped over the images and disturb the anatomical informations. Most of the researches performed to date removed the grid noises by calculating or observing those frequencies in one dimensional frequency domain, two dimensional wavelet transform or Fourier transform. Those methods filtered not only the grid noises but also diagnostic informations. In this paper, we proposed the combined wavelet packet-Fourier method to remove the grid artifact in CR images. For the phantom image, the proposed method achieved from 5.2 to 7.4 dB better than others in SNR and for CR images by rejecting the grid noise bands effectively while leaving the remaining bands unchanged, the loss of images could get minimal results.

Encryption/Decryption and Enterprise Security Management of Stock Trading Packets (증권거래 패킷의 암복호화와 통합보안관제 분석)

  • Oh, Won-Gyeom;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.227-230
    • /
    • 2013
  • Financial transactions using a mobile terminal and the Internet is activated, it is a stock exchange enabled using mobile devices and the Internet. Koscom in charge of IT operations of securities transaction-related in (securities ISAC), to analyze the vulnerability of information security related to securities transactions, which corresponds to running the integrated security control system. Online stock trading is a subject to the Personal Information Protection Act, electronic systems of related, has been designated as the main information and communication infrastructure to, damage financial carelessness of the user, such as by hacking is expected to are. As a result, research on the key vulnerabilities of information security fields related to securities business cancer decoding of the Securities and Exchange packet, through the analysis of security events and integrated security control is needed.

  • PDF

A Study of Core-Stateless Mechanism for Fair Bandwidth Allocation (대역 공평성 보장을 위한 Core-Stateless 기법 연구)

  • Kim, Hwa-Suk;Kim, Sang-Ha;Kim, Young-Bu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.4C
    • /
    • pp.343-355
    • /
    • 2003
  • Fair bandwidth allocations at routers protect adaptive flows from non-adaptive ones and may simplify end-to end congestion control. However, traditional fair bandwidth allocation mechanisms, like Weighted Fair Queueing and Flow Random Early Drop, maintain state, manage buffera and perform packet scheduling on a per-flow basis. These mechanisms are more complex and less scalable than simple FIFO queueing when they are used in the interi or of a high-speed network. Recently, to overcome the implementation complexity problem and address the scalability and robustness, several fair bandwidth allocation mechanisms without per-flow state in the interior routers are proposed. Core-Stateless Fair Queueing and Rainbow Fair Queuing are approximates fair queueing in the core-stateless networks. In this paper, we proposed simple Layered Fair Queueing (SLFQ), another core-stateless mechanism to approximate fair bandwidth allocation without per-flow state. SLFQ use simple layered scheme for packet labeling and has simpler packet dropping algorithm than other core-stateless fair bandwidth allocation mechanisms. We presente simulations and evaluated the performance of SLFQ in comparison to other schemes. We also discussed other are as to which SLFQ is applicable.

A Study on Detecting Black IPs for Using Destination Ports of Darknet Traffic (다크넷 트래픽의 목적지 포트를 활용한 블랙 IP 탐지에 관한 연구)

  • Park, Jinhak;Kwon, Taewoong;Lee, Younsu;Choi, Sangsoo;Song, Jungsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.821-830
    • /
    • 2017
  • The internet is an important infra resource that it controls the economy and society of our country. Also, it is providing convenience and efficiency of the everyday life. But, a case of various are occurred through an using vulnerability of an internet infra resource. Recently various attacks of unknown to the user are an increasing trend. Also, currently system of security control is focussing on patterns for detecting attacks. However, internet threats are consistently increasing by intelligent and advanced various attacks. In recent, the darknet is received attention to research for detecting unknown attacks. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. In this paper, we proposed an algorithm for finding black IPs through collected the darknet traffic based on a statistics data of port information. The proposed method prepared 8,192 darknet space and collected the darknet traffic during 3 months. It collected total 827,254,121 during 3 months of 2016. Applied results of the proposed algorithm, black IPs are June 19, July 21, and August 17. In this paper, results by analysis identify to detect frequency of black IPs and find new black IPs of caused potential cyber threats.

Performance Analysis of Docker Container Migration Using Secure Copy in Mobile Edge Computing (모바일 엣지 컴퓨팅 환경에서 안전 복사를 활용한 도커 컨테이너 마이그레이션 성능 분석)

  • Byeon, Wonjun;Lim, Han-wool;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.901-909
    • /
    • 2021
  • Since mobile devices have limited computational resources, it tends to use the cloud to compute or store data. As real-time becomes more important due to 5G, many studies have been conducted on edge clouds that computes at locations closer to users than central clouds. The farther the user's physical distance from the edge cloud connected to base station is, the slower the network transmits. So applications should be migrated and re-run to nearby edge cloud for smooth service use. We run applications in docker containers, which is independent of the host operating system and has a relatively light images size compared to the virtual machine. Existing migration studies have been experimented by using network simulators. It uses fixed values, so it is different from the results in the real-world environment. In addition, the method of migrating images through shared storage was used, which poses a risk of packet content exposure. In this paper, Containers are migrated with Secure CoPy(SCP) method, a data encryption transmission, by establishing an edge computing environment in a real-world environment. It compares migration time with Network File System, one of the shared storage methods, and analyzes network packets to verify safety.

The Method of Analyzing Firewall Log Data using MapReduce based on NoSQL (NoSQL기반의 MapReduce를 이용한 방화벽 로그 분석 기법)

  • Choi, Bomin;Kong, Jong-Hwan;Hong, Sung-Sam;Han, Myung-Mook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.667-677
    • /
    • 2013
  • As the firewall is a typical network security equipment, it is usually installed at most of internal/external networks and makes many packet data in/out. So analyzing the its logs stored in it can provide important and fundamental data on the network security research. However, along with development of communications technology, the speed of internet network is improved and then the amount of log data is becoming 'Massive Data' or 'BigData'. In this trend, there are limits to analyze log data using the traditional database model RDBMS. In this paper, through our Method of Analyzing Firewall log data using MapReduce based on NoSQL, we have discovered that the introducing NoSQL data base model can more effectively analyze the massive log data than the traditional one. We have demonstrated execellent performance of the NoSQL by comparing the performance of data processing with existing RDBMS. Also the proposed method is evaluated by experiments that detect the three attack patterns and shown that it is highly effective.