• Title/Summary/Keyword: Internal Network Information

Search Result 504, Processing Time 0.04 seconds

Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment (국방 네트워크 환경에서 ATT&CK 기반 취약점 완화 체계 구축 방안)

  • Ahn, Gwang Hyun;Lee, Hanhee;Park, Won Hyung;Kang, Ji Won
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.135-141
    • /
    • 2020
  • The Ministry of National Defense is strengthening the power and capacity of cyber operations as cyber protection training is conducted. However, considering the level of enemy cyber attack capability, the level of cyber defense capability of the ministry of national defense is significantly low and the protection measures and response system for responding to cyber threats to military networks are not clearly designed, falling short of the level of cyber security capabilities of the public and private sectors. Therefore, this paper is to investigate and verify the establishment of a military internal network vulnerability mitigation system that applies the intention of attackers, tactics, techniques and procedures information (ATT&CK Framework), identified military internal network main threat information, and military information system security requirements with military specificity as factors that can establish a defense network vulnerability mitigation system by referring to the domestic and foreign cyber security framework It has the advantage of having.

Unauthorized Software Blocking Techniques in Software Defined Network (SDN) Environments (Software Defined Network(SDN) 환경에서 비인가 소프트웨어 차단 기법)

  • Kang, Nam-Gil;Kwon, TaeWook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.393-399
    • /
    • 2019
  • In a situation where an unauthorized SW brought into the organization without being authorized is emerging as a threat to the network security, the security of the network based on the SDN(Software-Defined Network) can be strengthened through the development of the security application considering the organization's characteristics. Security technology of existing SDN environment has been studied to protect internal network from external networks such as firewalls and Intrusion Detection Systems, but the research for resolving insider threat was insufficient. Therefore, We propose a system that protects the internal network from unauthorized SW, which is one of the insider threats in the SDN environment.

Design and Implementation of Network Access Control for Security of Company Network (사내 네트워크 보안을 위한 네트워크 접근제어시스템 설계 및 구현)

  • Paik, Seung-Hyun;Kim, Sung-Kwang;Park, Hong-Bae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.12
    • /
    • pp.90-96
    • /
    • 2010
  • IT environment is rapidly changed, thus security threats such as worms and viruses have increased. Especially company's internal network requires to be inherently protected against these threats. In this respect, NAC(Network Access Control) has attracted attention as new network security techniques. The NAC implements the endpoint access decision based on the collected endpoint security status information and platform measurement information. In this paper, we describe the design and implementation of unauthorized NAC which protect against such as a worm, virus, malware-infected PC, and mobile device to connect to company's internal networks.

International Roaming Service Management Methodology Based on Network Management Information (망관리 정보에 기반한 국제로밍 서비스 품질 관리 기법)

  • Kim Ji-Sun;Kim Sung;In Hyung-June
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.73-76
    • /
    • 2006
  • International Roaming is a kind of telecommunication service that enables subscribers use the same mobile number when they go abroad and access other service provider's network. International roaming call is made through three network parts-home (original service provider) network, intermediate network, and local (overseas service provider) network. It is not possible to monitor every section of whole roaming service network because service providers do not provide their network management information to other service providers. The limitation causes harsh problem when a service anomaly arises and operators have to confirm the reason of failure. To solve this problem, we propose a scheme that deduces roaming service status of each overseas service provider using internal network management information. SK telecom implemented a international roaming service management system based on the scheme using performance measurement of signaling points, roaming service nodes, and charging data from existing network management systems.

  • PDF

Dilated Banyan Network Recirculation (재순환 구조를 가진 dilated 반얀 네트웍)

    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10B
    • /
    • pp.1841-1851
    • /
    • 1999
  • Banyan network has been widely employed as a basic building block for ATM switches. But the banyan network has very low routing capacity because of the internal blocking problem. Hence, a dilated banyan network has been used as one solution that can overcome the internal blocking problem. However, tremendous network capacity is wasted in the dilated network In this paper, we propose a dilated banyan network with deflection routing and recirculation mechanism to fully utilize the wasted capacity. The performance of the proposed switch is analysed under uniform traffic assumption. Numerical and simulation results show that the proposed switch yields a significant improvement of the maximum throughput as compared that of the pure dilated banyan network.

  • PDF

The Technological Method for Safe Processing of Sensitive Information in Network Separation Environments (망분리 환경에서 민감정보를 안전하게 처리하기 위한 기술적 방안)

  • Juseung Lee;Ilhan Kim;Hyunsoo Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.125-137
    • /
    • 2023
  • Companies that handle sensitive information, led by public institutions, establish separate networks for work and the Internet and protect important data through strong access control measures to prevent cyber attacks. Therefore, systems that involve the junction where the Intranet(internal LAN for work purposes only) and the Internet network are connected require the establishment of a safe security environment through both administrative and technical measures. Mobile Device Management(MDM) solutions to control mobile devices used by institutions are one such example. As this system operates by handling sensitive information such as mobile device information and user information on the Internet network, stringent security measures are required during operation. In this study, a model was proposed to manage sensitive information data processing in systems that must operate on the Internet network by managing it on the internal work network, and the function design and implementation were centered on an MDM solution based on a network interconnection solution.

Information Technologies In Teaching: The Basis Of Students' Knowledge

  • Morska, Nataliia;Fedorenko, Olena;Davydova, Olha;Andreev, Vitaly;Bohatyryova, Galina;Shcherbakova, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.44-53
    • /
    • 2021
  • The paper proposes to consider information technologies and their application in the educational process as a preparation of presentation material for students of higher educational institutions. The definition and place of information technologies in the educational space are considered. The object of research of this work is the pedagogical technology of presentation of educational information, which substantiates the pedagogical technology of visualization of educational information in higher education, as well as determine its composition and structure. The practical side of pedagogical technology of educational information presentation is considered.

Simulation of Detecting the Distributed Denial of Service by Multi-Agent

  • Seo, Hee-Suk;Lee, Young-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.59.1-59
    • /
    • 2001
  • The attackers on Internet-connected systems we are seeing today are more serious and more technically complex than those in the past. Computer security incidents are different from many other types of crimes because detection is unusually difficult. So, network security managers need a IDS and Firewall. IDS (Intrusion Detection System) monitors system activities to identify unauthorized use, misuse or abuse of computer and network system. It accomplishes these by collecting information from a variety of systems and network resources and then analyzing the information for symptoms of security problems. A Firewall is a way to restrict access between the Internet and internal network. Usually, the input ...

  • PDF

A Study on Control of Access to Internal Network Information and Authority Set Up Management for Client by Class (제한된 내부 네트워크 정보 접근제어와 계층별 클라이언트 권한설정 관리에 관한 연구)

  • Seo, Woo-Seok;Park, Jae-Pyo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.287-293
    • /
    • 2012
  • It has been only few years that various contents information subject for information processing system has been remarkably increased in online. If we say the year 2000 is the technology based year when deluge of information and data such as real time sharing, the time since after 2000 until 2011 has been a period plentiful of application based functions and solutions. Also, as the applicable range of these information process systems extends, individual information effluence has been social issues twice in 2009 and 2010. Thus now there are continuous efforts made to develop technologies to secure and protect information. However, the range problem has been extended from the illegal access from outside to the legal access from internal user and damages by agents hidden in internal information process system and client system. Therefore, this study discusses the necessity for the studies on efficiency based information security by control of access to internal information and authority setting for administrator and internal users. Based on the result of this study, it provides data that can be used from SOHO class network to large scale for information security method.

A Systematic Study of Network Firewall and Its Implementation

  • Alsaqour, Raed;Motmi, Ahmed;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.199-208
    • /
    • 2021
  • This is an era of technology and with the rapid growth of the Internet, networks are continuously growing. Companies are shifting from simple to more complex networks. Since networks are responsible to transmit huge data which is often sensitive and a point of concern for hackers. Despite the sizes of the networks, all networks are subject to several threats. Companies deploy several security measures to protect their networks from unauthorized access. These security measures are implemented from the device level to the network level. Every security layer adds more to the security of the company's network. Firewalls are the piece of software that provides internal and external security of the network. Firewalls aim to enhance the device level as well as network-level security. This paper aims to investigate the different types of firewalls, their architecture, and vulnerabilities of the firewall. This paper improves the understanding of firewall and its various types of architecture.