• Title/Summary/Keyword: IP Protection

Search Result 139, Processing Time 0.025 seconds

The Design for Security System of Linux Operating System (리눅스 운영체제를 위한 보안 시스템 설계)

  • Park, JinSeok;Kim, SoonGohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.4
    • /
    • pp.35-42
    • /
    • 2010
  • This paper reviews the current studies about the current secure OS, security module and SELinux, and suggests Linux access control module that uses the user discriminating authentication, security authority inheritance of subjects and objects, reference monitor and MAC class process and real-time audit trailing using DB. First, during the user authentication process, it distinguishes the access permission IP and separates the superuser(root)'s authority from that of the security manager by making the users input the security level and the protection category. Second, when the subjects have access to the objects through security authority inheritance of subjects and objects, the suggested system carries out the access control by comparing the security information of the subjects with that of the objects. Third, this system implements a Reference Monitor audit on every current events happening in the kernel. As it decides the access permission after checking the current MAC security attributes, it can block any malicious intrusion in advance. Fourth, through the real-time audit trailing system, it detects all activities in the operating system, records them in the database and offers the security manager with the related security audit data in real-time.

  • PDF

Analysis and Design of IP Traceback for Intrusion Response (침입대응을 위한 IP 역추적 시스템 분석 및 설계)

  • 이성현;이원구;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.412-415
    • /
    • 2004
  • As computers and networks become popular, corporation or country organization composes security network including various kinds information protection system to protect informations and resources from internet and is operating system and network. But current firewall and IDS(Intrusion Detection System) of the network level suffers from many vulnerabilities in internal computing informations and resources. In this paper, we design of ICMP-based Traceback System using a ICMP Traceback Message for efficiently traceback without change structure of routers. ICMP-based Traceback System. Create of ICMP message is managed by “Traceback Agent” mirroring port for router. Victim's systems that are received the message store it and “Traceback Manager” is detect a attack(like a DDoS). Using a information of this message starting a traceback and detecting a source of attacker, so response a attack.

  • PDF

User Authentication and Key Distribution on Open IPTV System (개방형 IPTV 환경에서의 사용자 인증 및 키 분배 메커니즘)

  • Jung, Ji-Yeon;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.227-236
    • /
    • 2011
  • IPTV(Internet Protocol Television) is one of the typical businesses which are the convergence of Broadcast and Communication. It provides broadcasting service using IP networks. Recently, IPTV service is developed to Mobile IPTV or Open IPTV. Especially, Open IPTV uses open platform so not only service providers but also general users can provide contents to other users. Open IPTV system has many content providers, so existing security solution of IPTV cannot be adopted. In this paper, we suggest user authentication and key distribution mechanism on Open IPTV. Our proposed mechanism is based on Kerberos, so it can support distribution environment such as Open IPTV. We demonstrate that proposed mechanism can guarantee secure transmission of contents and reduce the delay of user authentication on Open IPTV system compared to other authentication mechanisms. We also compare our proposal and other mechanisms in various aspects, and analyze efficiency and safety of proposed mechanism. As a result, we insist that this mechanism satisfies the security requirements for IPTV.

A Study of the Next Generation STOCK-NETWORK and Design (차세대 증권전산망(STOCK-NET)의 연구와 설계)

  • Ha, Sung-Yong;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.95-102
    • /
    • 2008
  • The next generation network preparation of stock computer network designated to facilities and goal facilities-based national main information communication certainly necessary for 'national competitiveness enhancement and national economic strength elevations'. This paper studies current government policy and network, security and securities computer network, and substitute for securities computer network-based the existing SONET/SDH, and next generation securities computer network designs so as to provide ALL-IP service-based MPLS for international GMG service. Set up stability, standardization, security, a basis of and compare is current next generation securities computer network by each bases in case of designs. Analyze an expected effect to have been improved at next generation stock computer network characteristics and merits and substitution width and QoS, communication instrument liquor, an information protection system etc. too. Result of research of this paper will contribute to national competitiveness enhancement and a national economic strength elevation to accomplish u-Korea.

  • PDF

Efficient and Secure User Authentication and SDP Encryption Method in SIP (일회성 암호를 이용한 효율적이고 안전한 SIP 사용자 인증 및 SDP 암호화 기법)

  • Kim, Jung-Je;Chung, Man-Hyun;Cho, Jae-Ik;Shon, Tae-Shik;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.463-472
    • /
    • 2012
  • This paper propose a security method that performs mutual authentication between the SIP UA and the server, check for integrity of the signaling channel and protection of SDP information for VoIP using a One-Time Password. To solve the vulnerability of existing HTTP Digest authentication scheme in SIP, Various SIP Authentication schemes have been proposed. But, these schemes can't meet security requirements of SIP or require expensive cryptographic operations. Proposed method uses OTP that only uses hash function and is updated each authentication. So Proposed method do not require expensive cryptographic operations but performs user authentication efficiently and safely than existing methods. In addition, Proposed method verifies the integrity of the SIP messages and performs SDP encryption/decryption through OTP that used for user authentication. So Proposed method can reduce communication overhead when applying S/MIME or TLS.

A Novel Method for Effective Protection of IPTV Contents with One-Time Password and Conditional Access System (IPTV 시스템에서의 효과적인 콘텐츠 보호를 위한 일회성 암호와 수신제한시스템을 사용한 보안 모델)

  • Seo, Ki-Taek;Kim, Tae-Hun;Kim, Jung-Je;Lim, Jong-In;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.31-40
    • /
    • 2010
  • The evolution of internet have opened the world of IPTV. With internet protocol, IPTV broadcasts contents stream. The IP protocol doesn't provide secure service due to IP characteristics. So, it is important to provide both connect and secure service. Conditional Access System and/or Digital Right Management are being used to protect IPTV contents. However, there exist restrictions in the view of security. In this paper, we analyse existing security technologies for IPTV and propose a novel method to enforce security efficiently. In the proposed method, OTP is used for encryption/decryption contents and CAS controls key for encryption/decryption and the right of user. With this scheme, it reduces the load of the system and provides more security.

Strengthening security structure of open Blockchain platform to enhance privacy protection of DApp users (DApp 사용자의 프라이버시 보호 강화를 위한 공개형 블록체인 플랫폼 보안구조 강화방안)

  • Hwang, Seonjin;Ko, DongHyun;Bahk, Taeu;Choi, Yoon-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.1-9
    • /
    • 2020
  • Along with the growth of Blockchain, DApp (Distributed Application) is getting attention. As interest in DApp grows, market size continues to grow and many developers participate in development. Many developers are using API(Application Programming Interface) services to mediate Blockchain nodes, such as Infura, for DApp development. However, when using such a service, there is a serious risk that the API service operator can violate the user's privacy by 1 to 1 matching the account address of the Transaction executed by the DApp user with the IP address of the DApp user. It can have an adverse effect on the reliability of public Blockchains that need to provide users with a secure DApp service environment. The proposed Blockchain platform is expected to provide user privacy protection from API services and provide a reliable DApp use environment that existing Blockchain platforms did not provide. It is also expected to help to activate DApp and increase the number of DApp users, which has not been activated due to the risk of an existing privacy breach.

Effects of Follicle Stimulating Hormone on ${\gamma}$-Ray Irradiated Immature Mouse Ovarian Follicles (난포성숙호르몬이 감마선 조사된 미성숙 생쥐 난포에 미치는 영향)

  • Kim, Jin-Kyu;Lee, Chang-Joo;Lee, Young-Keun;Song, Kang-Won;Yoon, Yong-Dal
    • Journal of Radiation Protection and Research
    • /
    • v.23 no.2
    • /
    • pp.89-96
    • /
    • 1998
  • To assess the radioprotective effects of follicle stimulating hormone (FSH) on ovarian follicles, 3 week-old female mice were irradiated with 8.33 Gy of ${\gamma}$-ray (group R) and followed by 5 IU ip-injection of FSH (group RF). For control groups, 5 IU of saline (group C) or 5 IU of FSH (group F) was ip-injected. Ovaries were collected 0h, 6h, 12h, 14, 2d, 4d, and 8d after irradiation or saline/FSH injection, and followed by fixation in neutral buffered formalin for routine histochemistry. Immunohistochemistry was used to assess the status of follicles and DNA fragmentation was analyzed by agarose gel electrophoresis for total DNA. Staining specific for apoptotic follicles showed high intensity at 6h and 12h in group R and RF On the other hand, staining specific for proliferating follicles showed noticeably high intensity at 8d in group R and Rf. DNA fragmentation of 185bp increased with time in all experimental groups. Especially 370bp appeared at 6h in group R, then disappeared after 1d. In case of group RF, it appeared at 12h and disappeared after 1d. From the above results, the irradiated antral follicles become completely disappeared from 4d to 8d, and then new follicles started to grow again at 8d. FSH had delaying or suppressing effects on follicular atresia after irradiation. In addition, it became clear that radiation-induced follicular atresia was mediated by granulosa cell apoptosis.

  • PDF

Fingerprint-Based 1-out-of-n Access Control Technique for Media Service Protection in IPTV Broadcasting System (IPTV의 미디어 서비스 보호를 위한 지문 인식 기반의 1-out-of-n 접근 통제 기법)

  • Lee, Ji-Seon;Rhee, Hyun-Sook;Kim, Hyo-Dong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.687-694
    • /
    • 2010
  • IPTV(Internet Protocol Television) is an emerging technology in which telecommunication and broadcasting technologies are converged. IPTV service providers usually multicast scrambled contents. And only legitimate subscribers who pass the access control can de-scramble and use the contents. In order to ensure revenues, providers oftentimes employ password-based authentication protocols that ensure secure authentication processes between set-top box and smart card. In this paper, we propose a fingerprint-based 1-out-of-n authentication protocol which provides convenient and more secure authentication process in some organizational environments. The proposed scheme shows that only those who provide legitimate fingerprint information can be authenticated even in a situation that both password and smart card are compromised.

Cell-Based IL-15:IL-15Rα Secreting Vaccine as an Effective Therapy for CT26 Colon Cancer in Mice

  • Thi, Van Anh Do;Jeon, Hyung Min;Park, Sang Min;Lee, Hayyoung;Kim, Young Sang
    • Molecules and Cells
    • /
    • v.42 no.12
    • /
    • pp.869-883
    • /
    • 2019
  • Interleukin (IL)-15 is an essential immune-modulator with high potential for use in cancer treatment. Natural IL-15 has a low biological potency because of its short half-life and difficulties in mass-production. IL-15Rα, a member of the IL-15 receptor complex, is famous for its high affinity to IL-15 and its ability to lengthen the half-life of IL-15. We have double-transfected IL-15 and its truncated receptor IL-15Rα into CT26 colon cancer cells to target them for intracellular assembly. The secreted IL-15:IL-15Rα complexes were confirmed in ELISA and Co-IP experiments. IL-15:IL-15Rα secreting clones showed a higher anti-tumor effect than IL-15 secreting clones. Furthermore, we also evaluated the vaccine and therapeutic efficacy of the whole cancer-cell vaccine using mitomycin C (MMC)-treated IL-15:IL-15Rα secreting CT26 clones. Three sets of experiments were evaluated; (1) therapeutics, (2) vaccination, and (3) long-term protection. Wild-type CT26-bearing mice treated with a single dose of MMC-inactivated secreted IL-15:IL-15Rα clones prolonged survival compared to the control group. Survival of MMC-inactivated IL-15:IL-15Rα clone-vaccinated mice (without any further adjuvant) exceeded up to 100%. This protection effect even lasted for at least three months after the immunization. Secreted IL-15:IL-15Rα clones challenging trigger anti-tumor response via CD4+ T, CD8+ T, and natural killer (NK) cell-dependent cytotoxicity. Our result suggested that cell-based vaccine secreting IL-15:IL-15Rα, may offer the new tools for immunotherapy to treat cancer.