• Title/Summary/Keyword: 패킷 보호

Search Result 274, Processing Time 0.025 seconds

The case study of implementation for a limited hospital medical information system based on ACL-applied router (ACL이 적용된 라우터 기반의 제한된 병원 의료정보시스템의 구현 사례)

  • Yoon, Sung-Ja;Kim, No-Whan;Kang, Eun-Hong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.10
    • /
    • pp.1003-1008
    • /
    • 2016
  • Recently hospitals have divided into many divisions, specialized the medical service, and shown organic cooperation, all to provide patients with various and high quality medical service. They have also showed improvement in information protection by introducing an information protection system to regulate the access to patients' medical and personal information. The purpose of this paper is to present a case study to implement of a limited hospital medical information system that can regulate the access to medical information. For this, a router-based virtual network applying an ACL(: Access Control List) to regulate access to information was made using a packet tracer.

A Hybrid Multiple Pattern Matching Scheme to Reduce Packet Inspection Time (패킷검사시간을 단축하기 위한 혼합형 다중패턴매칭 기법)

  • Lee, Jae-Kook;Kim, Hyong-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.27-37
    • /
    • 2011
  • The IDS/IPS(Intrusion Detection/Prevention System) has been widely deployed to protect the internal network against internet attacks. Reducing the packet inspection time is one of the most important challenges of improving the performance of the IDS/IPS. Since the IDS/IPS needs to match multiple patterns for the incoming traffic, we may have to apply the multiple pattern matching schemes, some of which use finite automata, while the others use the shift table. In this paper, we first show that the performance of those schemes would degrade with various kinds of pattern sets and payload, and then propose a hybrid multiple pattern matching scheme which combines those two schemes. The proposed scheme is organized to guarantee an appropriate level of performance in any cases. The experimental results using real traffic show that the time required to do multiple pattern matching could be reduced effectively.

전산망 보호를 위한 방화벽 시스템 고찰

  • 박응기;손기욱;정현철
    • Review of KIISC
    • /
    • v.6 no.2
    • /
    • pp.5-20
    • /
    • 1996
  • 본 고는 인터네트와 내부(로컬) 네트워크 사이에 위치하여 내부 네트워크의 자원 및 중요한 정보를 해커 및 불법 침입자로부터 보호하기 위해서 사용되는 방화벽(Firewall) 시스템에 대해 분석하였다. 방화벽 시스템은 OSI 참조 모델의 계층 3과 계층 4에서 프로토콜 정보에 따라 패킷 필터링을 수행하는 스크리닝 라우터(Screening Router) 와 OSI 참조 모델의 상위 계층에서 트래픽을 허가 및 거절하는 게이트웨이 혹은 proxy로 크게 나눌 수 있다. 이러한 방화벽 시스템들은 인터네트 등의 외부 네트워크와 내부 네트워크 사이에서 네트워크 트래픽을 감시하고, 허가 및 거절하는 역할을 수행한다. 인터네트 등 외부 네트워크에 연결된 내부 네트워크를 보호하기 위해서는 강력한 암호화기법 및 정보보호 서비스를 내부 네트워크의 시스템에 구현하고, 방화벽 시스템을 사용하면 해커 등과 같은 불법 침입자로부터 내부 네트워크의 자원 및 정보를 보다 효율적으로 보호할 수 있다.

  • PDF

A New framework for IP Traceback : Inference of Logical Topology by Measuring Packet Losses (IP 역추적을 위한 새로운 접근 : 패킷 손실 기반의 논리적 전송 경로 추정)

  • 이준엽;이승형;양훈기;고재영;강철오;정주영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.39-47
    • /
    • 2002
  • This paper deals with study of a new framework for the traceback of distributed DoS(Denial of Service) attacks in the Internet, in which many sources flood "spoofed" IP packets towards a single victim. In our scheme, the destination host traces those anonymous packets' losses, and infers the logical end-to-end paths back towards the sources. This method is based on the fact that there is a strong correlation between packet losses when those packets traverse along a same route, and the simulation results show high probabilities of detecting the topology under a certain condition. Compared with previous approaches, our scheme has a number of distinct features: It can be performed in realtime or non-realtime, without any supports of routers or ISPs. Our results may be applied to the inference of physical topology and to support previous approaches.pproaches.

Lightweight Packet Authentication for Access Control in IEEE 802.11 (IEEE 802.11에서의 접근 제어를 위한 Lightweight 패킷 인증)

  • Lee, Keun-Soon;Kim, Hyo-Jin;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.29-38
    • /
    • 2005
  • Because IEEE 802.11 has several security vulnerabilities, IEEE 802.11i was proposed and accepted. But IEEE 802.11i has much overhead for most of users for the web surfing. Besides not only node the authentication but also the packet authentication is needed to communicate. Although IEEE 802.11i uses TKIP(Temporal Key integrity Protocol) and CCMP(CTR with CBC-MAC Protocol), they have a lot of overheads. In this paper, Lightweight Packet Authentication(LIPA) is proposed. LIPA has less overhead and short delay so that it can be affordable for simple web-surfing which does not need stronger security. After comparing performances of LIPA with those of TKIP and CCMP, LIPA is more efficient than other schemes for transmitting packets.

A Study on Cloud Redundancy for Secure Digital Content Services

  • Eun-Gyeom Jang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.11
    • /
    • pp.209-216
    • /
    • 2024
  • In This paper, we proposed a technology to provide safety and convenience for cloud computing services. The proposed technology strengthens user authentication for the safe service of digital content in a cloud computing environment and proposes a technology to prevent packet infringement on the network. For user authentication, a dual authentication method and an access medium authentication method were applied, and a secure service was provided through session authentication to protect packets on the network. Real-time synchronization between systems as a cloud system's multiplexed service method ensures smooth service is always supported in the event of a system failure. The proposed user authentication technology prevents illegal user access and enables management by access license with the system simultaneous access user management function. Authentication session tickets of authenticated users provide convenience in system access and service use during the validity of the ticket, and packet infringement prevention functions.

A Security Communication Protocol between CA and Vehicle for WAVE System (WAVE 시스템 환경에서 CA와 차량간 보안통신 프로토콜)

  • Seo, Dong-Won;Park, Seung-Peom;Ahn, Jae-Won;Kim, Eun-Gi
    • Annual Conference of KIPS
    • /
    • 2014.11a
    • /
    • pp.416-418
    • /
    • 2014
  • WAVE (Wireless Access in Vehicular Environments) 시스템 환경은 차량 간 무선통신을 가능하게 해주는 환경이다. 무선통신의 활용이 증가하면서 그에 따른 공격 방법도 증가하여, 통신 시 제3자에 의해 패킷이 변조될 수 있다. 제3자로부터 패킷을 보호하기 위해 통신 전 차량은 CA (Certificate Authority)로부터 자신이 적합한 호스트라는 것을 인증 받아야 한다. 본 논문에서는 차량과 CA의 통신 과정에서 Diffie-Hellman Key Exchange 알고리즘과 AES (Advanced Encryption Standard) 알고리즘 등을 이용하여 패킷의 기밀성과 무결성을 보장하는 프로토콜을 설계하였다.

An effegive round-robin packet transmit scheduling scheme based on quality of service delay requirements (지연 서비스품질 요구사항을 고려한 효과적인 라운드 로빈 패킷 전송 스케쥴링 기법)

  • 유상조;박수열;김휘용;김성대
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.10
    • /
    • pp.2191-2204
    • /
    • 1997
  • An efficient packet transmit scheduling algorithm should be able to allocate the resource to each connection fairly based on the bandwidth and quality of service requirements negotiated during the call admission procedure and it should be able to isolate the effects of users that are behaving badly. In this paper, we propose an effective round-robin packet transmit scheduling mechanism, which we call the delay tolerant packet reserving scheme (DTPRS) based on delay QoS requirments. The proposed scheme can not only provide fairness and but also reduce delay, delay variation, and packet loss rate by reserving output link time slots of delay tolerant packets and assigning the reserved slotsto delay urgent packets. Our scheme is applicable to high speed networks including ATM network because it only requires O(1) work to process a packet, and is simple enough to implement.

  • PDF

Mobile IPv6 Problem with Firewalls (Mobile IPv6 환경에서 방화벽 사용에 관한 문제점)

  • Ha Dong-Joo;Youm Heung-Youl
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.741-744
    • /
    • 2006
  • Mobile IPv6은 방화벽의 사용을 전혀 고려하지 않은 채 설계되었다. 그렇기 때문에 방화벽을 사용하는 네트워크에서는 정상적으로 동작하지 않는 문제가 생긴다. 본 논문에서는 일반적인 방화벽의 패킷 판단에 사용되는 상태테이블에 관하여 설명하고, Mobile IPv6 환경에서 방화벽을 사용함으로써 생기는 문제점을 알아본 뒤 향후 Mobile IPv6 환경에서의 방화벽 사용에 관한 연구의 방향을 제안한다.

  • PDF

A study of Diameter-based Prepaid Accounting Model for a Public Wireless LAN (공중 무선랜의 이동환경을 위한 Diameter 기반 선불 과금 모델 연구)

  • 이진우;김관연;박세현
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.241-244
    • /
    • 2003
  • 공중 무선랜 서비스의 확산으로 무선랜은 무선 인터넷의 중요한 매체로 이용되고 있다. 그러나 사용자의 프라이버시(Privacy) 문제나 접근제어(Access Control) 같은 인증 (Authentication) 문제와 함께 과금(Accounting) 및 빌링(Billing)의 문제가 중요한 이슈로 대두되고 있다. 본 논문에서는 공중 무선랜의 이동환경을 위한 Diameter 기반 선불 과금 모델을 제안하고, 그에 대한 검증 결과를 함께 제시한다. 최종적으로 제안된 선불 과금 모델은 공중 무선랜에서의 패킷과금을 지원하기 위한 요구사항들을 충족시키고, 글로벌 로밍 서비스를 위한 이동성을 향상하는 기반 기술로서 이용되기를 기대한다.

  • PDF