• Title/Summary/Keyword: Bastion

Search Result 15, Processing Time 0.02 seconds

A Study on Open Based Network Security System Architecture (개방형 네트워크 보안 시스템 아키텍처에 관한 연구)

  • Kim, Chang-Su;Kim, Tak-Chen;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.782-785
    • /
    • 2007
  • If existing system need to expand security part, the security was established after paying much cost, processing of complicated installation and being patient with inconvenience at user's view because of closed structure. In this thesis, those defects could be overcome by using open security tools and constructing security server, which is firewall of 'bastion' form including proxy server, certification server and so on. Also each security object host comes to decide acceptance or denial where each packet comes from, then determines security level each hosts. Precisely it is possible choosing the packets from bastion host or following at the other policies. Although an intruder enter into inside directly, it is constructed safely because encryption algorithm is applied at communication with security object host. This thesis suggests more flexible, independent and open security system, which improves existing security through systematic linkage between system security and network security.

  • PDF

Open Based Network Security System Architecture (개방형 네트워크 보안 시스템 구조)

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.643-650
    • /
    • 2008
  • If existing system need to expand security part, the security was established after paying much cost, processing of complicated installation and being patient with inconvenience at user's view because of closed structure. In this thesis, those defects could be overcome by using open security tools and constructing security server, which is firewall of 'bastion' form including proxy server, certification server and so on. Also each security object host comes to decide acceptance or denial where each packet comes from, then determines security level each hosts. Precisely it is possible choosing the packets from bastion host or following at the other policies. Although an intruder enter into inside directly, it is constructed safely because encryption algorithm is applied at communication with security object host. This thesis suggests more flexible, independent and open security system, which improves existing security through systematic linkage between system security and network security.

Study on Animal Production and Disease Affected by Different Varieties of Tall Feacue and White Clover in Mixed Grazing Pasture I. Liveweight gain, herbage intake and forage conversation efficiency of grazing animal in pasture 1 year after seeding (혼파방목지에서 Tall Fescue와 두과목초 조합에 따른 가축생산성과 질병 비교 연구 I. 조성후 1차년도의 초지에서 방목가축의 증체량 , 채식량 및 사료효율)

  • 정창조;김문철;김규일;장덕지;김중계
    • Journal of The Korean Society of Grassland and Forage Science
    • /
    • v.16 no.2
    • /
    • pp.127-132
    • /
    • 1996
  • This study was carried out to obtain good livestock production in comparison with 3 different pasture mixture (Control : TI = Potomac orchardgrass + Bastion perennial ryegrass + Fawn tall fescue + Regal white clover, T2 = Potomac orchardgrass + Bastion perennial ryegrass + Roa tall fescue + Regal white clover, T3 = Potomac orchardgrass + Bastion perennial ryegrass + Roa tall fescue + Tahora white clover) by grazing experiment used 45 dairy calves (about lOOkg liveweight) during the period from April to October, 1994 at the Isidole farm, Cheju. Daily liveweight gains of calves grazed during the experiment period were 331${\pm}$29, 352${\pm}$4, 356${\pm}$18g in treatment 1, 2 and 3 respectively, but did not get statistically significant difference. On compared the results with the period investigated, the period which was highest in daily liveweight gain was early grazing season b m May to June while the period shown to be lowest in daily liveweight gain was between late July and late August. Hehage intake rate did not get significant difference among treatments with results shown as 67${\pm}$1.2, 62${\pm}$5.1, 60${\pm}$9.6% in treatment 1, 2 and 3 respectively. And efficiency of conversation into animal product was high in treatment 2. It is considered that good results were not obtained in this study because tall fescue and white clover, important species in this trial did not cover the pasture well with slow establishment in 1st year after seeding.

  • PDF

A Study on Techniques of the construction and Space Structure of Nam-hea city walls (남해읍성의 공간구성과 축조기법에 관한 연구)

  • Kwon, Soon-Kang;Lee, Ho-Yeol
    • Journal of architectural history
    • /
    • v.18 no.5
    • /
    • pp.59-80
    • /
    • 2009
  • The purpose of this study is to investigate the history, space structures, blueprint, and techniques of the construction of Nam-hea city walls. Nam-hea city walls were relocated in 1439 from Whagumhun-Sansung(火金峴山城) to the present site, nearby Nam-hea Um.(南海邑) The city walls were rebuilt after they were demolished during Japanese invasion on Korea in 1592 and their reconstruction was also done in 1757. At present, the city walls only partially remained due to the urbanization of the areas around them. A plane form of the City wall is a square, and the circumference os approximately 1.3km. According to the literature, the circumference of the castle walls is 2,876尺, the height is 13尺, and the width is 13尺 4寸. Hang-Kyo(鄕校). SaGikDan(社稷壇), YoeDan(厲壇), SunSo(船所) which is a harbor, as well as government and public offices such as Kaek-Sa(客舍) and Dong-Hun(東軒) existed inside the castle walls. Inside the castle walls were one well, five springs, one ditch, and one pond, and in the castle walls, four castle gates, three curved castle walls, and 590 battlements existed. The main government offices inside castle walls were composed of Kaek-Sa, Dong-Hun, and Han-Chung(鄕廳) their arrangements were as follows. Kaek-Sa was situated toward North. Dong-Hun was situated in the center of the west castle walls. The main roads were constructed to connect the North and South castle gate, and subsidiary roads were constructed to connect the East and West castle gate. The measurement used in the blueprint for castle wall was Pobaek-scale(布帛尺:1尺=46.66cm), and one side of it was 700尺. South and North gate were constructed in the center of South and North castle wall, and curved castle walls was situated there. One bastion was in the west of curved castle walls and two bastions were in the east of curved castle walls. The east gate was located in the five eighths of in the east castle wall. Two bastions were situated in the north, on bastion in the south, one bastion in the south, and four bastions in the west castle wall. The castle walls were constructed in the following order: construction of castle field, construction of castle foundation, construction of castle wall, and cover the castle foundation. The techniques used in the construction of the castle walls include timber pile(friction pile), replacement method by excavation.

  • PDF

A Study on the Service Adaptation Process of Multicultural Soldiers : Focused on Ground Theory (다문화 병사의 복무 적응과정에 관한 연구 : 근거이론 방법을 중심으로)

  • Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.209-214
    • /
    • 2020
  • In terms of population structure, korea military power has entered a serious danger zone, and that birth rate has led not only to a decrease in the population of the nation's economic activity, but also to a decrease in troop resources in our last security bastion, and the trend of "children from multicultural families" joining the army is predicted to soon become a "cultural force" with an average of 8,000 troops expected to join the army between 2025 and 2031. After all, the seriousness of the problem of declining troop resources in the military organization, the nation's last security bastion, and the multicultural army will be added. Therefore, this study reveals how multicultural soldiers are adapting to military service and analyzes them in depth by categorizing a series of processes on military life adaptation.

Implementation of Hybrid Firewall System for Network Security (전산망 보호를 위한 혼합형 방화벽 시스템 구현)

  • Lee, Yong-Joon;Kim, Bong-Han;Park, Cheon-Yong;Oh, Chang-Suk;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.6
    • /
    • pp.1593-1602
    • /
    • 1998
  • In this paper, a hybrid firewall system using the screening router, dual-homed gateway, screened host galeway and the application level gateway is proposed, The screened host gateway is comjXlsed of screening router, DMZ and bastion host. All external input traffics are filtered by screening router with network protrcol filtering, and transmitted to the bastion host performing application level filtering, The dual homed gateway is an internlediate equipment prohibiting direct access from external users, The application level gateway is an equipment enabling transmission using only the proxy server. External users can access only through the public servers in the DMZ, but internal users can aeee through any servers, The rule base which allows Telnet only lo the adrnilllslratol is applied to manage hosts in the DMZ According to the equipmental results, denial of access was in orderof Web. Mail FTP, and Telnet. Access to another servers except for server in DMZ were denied, Prolocol c1mials of UDP was more than that of TCP, because the many hosts broadcasted to networds using BOOTP and NETBIOS, Also, the illegal Telnet and FTP that transfer to inside network were very few.

  • PDF

A Study on the Status and Performance of Cultural Heritage in the Demilitarized Zone on the Korean Peninsula (한반도 비무장지대 문화유산의 실태조사 현황과 성과 고찰)

  • HWANGBO Kyung
    • Korean Journal of Heritage: History & Science
    • /
    • v.57 no.2
    • /
    • pp.28-50
    • /
    • 2024
  • A fact-finding survey of the Demilitarized Zone can be said to be a very meaningful academic survey linked to previous index surveys of protected military areas and municipal and excavation surveys of ruins and military sites on Mount Dora. Not a few ruins were first discovered in this survey, and the locations, structures, and restoration artifacts of the previously investigated ruins were confirmed differently, raising the need for a detailed investigation. In particular, it is noteworthy that various relics from the Paleolithic Age to the Joseon Dynasty were recovered from relics dispersion sites such as Josan-ri and Cheorwon Gangseo-ri in Paju, and Hoengsan-ri Temple Site is also a Buddhist relic in the Demilitarized Zone. However, in the case of some graveyards and relics sites in the Paju region, it was an opportunity to understand the reality that they are not safe from cultivation and development, and the ruins of Cheorwon Capital Castle, Seongsanseong Fortress, Jorangjin Bastion, and Gangseo-ri Bastion were damaged during the construction of military facilities, and an urgent investigation is needed. Also, farmland and hilly areas around the ruins of Jangdan, Gunnae-myeon, and Gangsan-ri have not been properly investigated for buried cultural assets due to small-scale development. Therefore, it is an important time for the relevant authorities and agencies to cooperate more closely to establish special management and medium- to long-term investigation measures for the cultural heritage in the Demilitarized Zone based on the results of this fact-finding investigation.

A Study of Security System for Internet Shopping Mall (인터넷 쇼핑몰의 보안 시스템에 관한 연구)

  • 이내준
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.11
    • /
    • pp.1383-1394
    • /
    • 2001
  • Through the extension of damages caused by hacking and computer virus, although security control has been emphasized, hackers' capability exceeded the security controllability. The basic security setup of server system will be free from the damages by primary and intermediate level which are the major group. It should be noted that security condition of most middle-sized and personal systems is widely open for hacker's intrusion. There is no perfect information system either software-wise or hardware-wise. It has to be recognized that our systems will be attacked easily by the hackers and computer virus. Computer users are demanded to be prepared for these types of surprise attacks. In this paper, I will propose a formation of Bastion server. This will protect risks from inside & outside intrusion which have been known till today.

  • PDF

IP Spoofing 대응 기능을 가진 방화벽 시스템 구현

  • 최석윤;김중규
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1997.03a
    • /
    • pp.163-181
    • /
    • 1997
  • This dissertation provides a theroetic study on the network security in general , the firewall in particular . In fact, the firewall has been recognized as a very promising option to obtain the security in the real world network environment . The dissertation provides a thorough theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procedure to make analysis plans of the firewall configuration. Based on the above investigation and analysis , this dissertation provides two approaches to network security, which address a number of issues both at the network and at application level. At the network level. a new methdo is proposed which uses packet filtering based on the analysis of the counter plot about the screen router. On the other hand at the application level, a novel method is exlored which employs security software , Firewall-1, on Bastion host. To demonstrate the feasibility and the effectiveness of the proposed methodologes, a prototype implementation is made. The experiment result shows that the screen router employing the proposesed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegarl packets entering from external hackers. Meanwhile , at the application level. the proposed software approach employing Firewall -1 is proved to be robust enough to provent hackings from the outer point to point protocol connection. Theoretically, it is not possible to provide complete secuirty to the network system, because the network security involove a number of issues raised from low level network equipments form high level network protocol. The result in this dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.

Intranet을 위한 방화벽 시스템구현에 관한 연구

  • 최석윤;김중규
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.2 no.1
    • /
    • pp.103-123
    • /
    • 1997
  • This dissertation provides a theoretic study on the network security in general , the firewall in particular. In fact the firewall has been recognized as a very promising option to obtain the security inthe real work network environment . The dissertation provides a throuth theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procddure to make analysis and plans of the firewall configuration . Based on the above investigation and analysis, this dissertation provides two approaches to network security , which address anumber of issuesboth at the network and at applicatino level. At the network level, a new method is proposed which uses packet filtering based on the analysis of the counter plot about the screen router.On the other hand, at the application level, a novel method is explored which employs secureity software. Firewall-1 , on Bastion host. To demonstrate the feasibililty and the effectiveness of the proposed methodologties , a prototype implementation is made The experiment result shows that the screen router employing the proposed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegal packets entering form external hackers. Meanwhile , at the application level, the proposed software approach employing Firewall-1 is proved to be robust enugh to prevent hackings from the outer point the point protocal connnection . Theoretically, it is not possible to provide complete security to the network system, because the network security involve a number of issues raised form low level network equipments form high level network protocol. The result inthis dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.