• Title/Summary/Keyword: Internal network

Search Result 1,181, Processing Time 0.029 seconds

Real-time security Monitroing assessment model for cybersecurity vulnera bilities in network separation situations (망분리 네트워크 상황에서 사이버보안 취약점 실시간 보안관제 평가모델)

  • Lee, DongHwi;Kim, Hong-Ki
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.45-53
    • /
    • 2021
  • When the security monitoring system is performed in a separation network, there is little normal anomaly detection in internal networks or high-risk sections. Therefore, after the establishment of the security network, a model is needed to evaluate state-of-the-art cyber threat anomalies for internal network in separation network to complete the optimized security structure. In this study, We evaluate it by generating datasets of cyber vulnerabilities and malicious code arising from general and separation networks, It prepare for the latest cyber vulnerabilities in internal network cyber attacks to analyze threats, and established a cyber security test evaluation system that fits the characteristics. The study designed an evaluation model that can be applied to actual separation network institutions, and constructed a test data set for each situation and applied a real-time security assessment model.

A Study on Methodology for Protection of Malicious Traffic in Groupware Network System (그룹웨어시스템상의 악성트래픽 차단 네트워크구조 설계방법)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.8 no.1
    • /
    • pp.69-76
    • /
    • 2007
  • The blocking of malicious traffic in groupware network system is used to prevent the spread and distribution of malicious traffic. The method protecting from malicious traffic in groupware system is designed to handle the malicious traffic of various routes with the internal course of groupware, which leads to lighten the load of security and traffic. It was impossible to block this kind of traffic at the traditional structure. When the protection of the proposed groupware system is performed, there appears to be a great change for the rate of a load factor at the CPU of Backbone Switch which is connected to the internal gateway. The load factor of CPU, which was increased with the traffic, is now remarkably reduced after the internal gateway is set up. This is to show that a lot of malicious traffic pass through the internal network and that network environment is faced to the menace of many malicious traffics. This paper is to show the efficiency of protection of internal gateway proposed in this study, for the rate of CPU of Backbone Switch was about 17% a day, but was dropped up to the 4% after the malicious traffic was removed.

  • PDF

Concrete Strength Prediction Neural Network Model Considering External Factors (외부영향요인을 고려한 콘크리트 강도예측 뉴럴 네트워크 모델)

  • Choi, Hyun-Uk;Lee, Seong-Haeng;Moon, Sungwoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.7-13
    • /
    • 2018
  • The strength of concrete is affected significantly not only by the internal influence factors of cement, water, sand, aggregate, and admixture, but also by the external influence factors of concrete placement delay and curing temperature. The objective of this research was to predict the concrete strength considering both the internal and external influence factors when concrete is placed at the construction site. In this study, a concrete strength test was conducted on the 24 combinations of internal and external influence factors, and a neural network model was constructed using the test data. This neural network model can predict the concrete strength considering the external influence factors of the concrete placement delay and curing temperature when concrete is placed at the construction site. Contractors can use the concrete strength prediction neural network model to make concrete more robust to external influence factors during concrete placement at a construction site.

Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment (국방 네트워크 환경에서 ATT&CK 기반 취약점 완화 체계 구축 방안)

  • Ahn, Gwang Hyun;Lee, Hanhee;Park, Won Hyung;Kang, Ji Won
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.135-141
    • /
    • 2020
  • The Ministry of National Defense is strengthening the power and capacity of cyber operations as cyber protection training is conducted. However, considering the level of enemy cyber attack capability, the level of cyber defense capability of the ministry of national defense is significantly low and the protection measures and response system for responding to cyber threats to military networks are not clearly designed, falling short of the level of cyber security capabilities of the public and private sectors. Therefore, this paper is to investigate and verify the establishment of a military internal network vulnerability mitigation system that applies the intention of attackers, tactics, techniques and procedures information (ATT&CK Framework), identified military internal network main threat information, and military information system security requirements with military specificity as factors that can establish a defense network vulnerability mitigation system by referring to the domestic and foreign cyber security framework It has the advantage of having.

Information as An Object of Legal Regulation in Ukraine

  • Iasechko, Svitlana;Ivanovska, Alla;Gudz, Tetyana;Marchuk, Mykola;Venglinskyi, Oleksandr;Tokar, Alla
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.237-242
    • /
    • 2021
  • The article deals with the problematic issues of defining information as an object of private relations. Definitions that they are intangible and non-consumable by nature, are inextricably linked to a specific material carrier are/or secured by the subject that transmits them, messages, and information that have quantitative and qualitative characteristics, and are capable of having a freight or another value, and in case of its illegal usage causing damage and moral harm.

Using The Internet As A Tool For The Illicit Sale Of Drugs And Potent Substances

  • Manzhai, Oleksandr;Cherevko, Kyrylo;Chycha, Ruslan;Burlaka, Iryna;Piadyshev, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.246-250
    • /
    • 2022
  • The article analyzes the regulations of current criminal law and current issues, combating drug crime on the Internet, as well as measures to combat drug crime in the field of modern information technology. In connection with the growth of crimes in the field of drug trafficking committed with the use of information and telecommunications technologies, the urgent task of the state is to find effective ways to reduce drug crime. The article considers criminologically significant aspects of the mechanism of illicit drug trafficking, which is carried out with the use of information and telecommunication technologies and means of remote communication.

Dilated Banyan Network Recirculation (재순환 구조를 가진 dilated 반얀 네트웍)

    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10B
    • /
    • pp.1841-1851
    • /
    • 1999
  • Banyan network has been widely employed as a basic building block for ATM switches. But the banyan network has very low routing capacity because of the internal blocking problem. Hence, a dilated banyan network has been used as one solution that can overcome the internal blocking problem. However, tremendous network capacity is wasted in the dilated network In this paper, we propose a dilated banyan network with deflection routing and recirculation mechanism to fully utilize the wasted capacity. The performance of the proposed switch is analysed under uniform traffic assumption. Numerical and simulation results show that the proposed switch yields a significant improvement of the maximum throughput as compared that of the pure dilated banyan network.

  • PDF

Study of Channel Model Characterization of Human Internal Organ in On-Body System at 2.45 GHz (2.45 GHz On-Body 시스템에서 인체 내부 장기에 따른 채널 모델 특징 연구)

  • Jeon, Jaesung;Choi, Jaehoon;Kim, Sunwoo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.1
    • /
    • pp.62-69
    • /
    • 2014
  • In this paper, WBAN(Wireless Body Area Network) On-body system using the surface-oriented antenna about the impact of human internal organs were analyzed through experiments. The received signal strength is measured for effect of human using the human model and the phantom of torso. Experiments are performed in anechoic chamber without moving and measured by Vector Network Analyzer. This paper confirms the effect of human body by comparing the human model and the phantom of torso. And also know the human internal organs effect on the antennas loss of received signal strength by measured data.

A New Filtering System against the Disclosure of Sensitive Internal Information (내부 중요정보 유출 방지를 위한 차단 시스템 개발)

  • Ju, Tae-kyung;Shin, Weon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1137-1143
    • /
    • 2015
  • Sensitive internal information has been transmitted in a variety of services of Internet environment, but almost users do not know what internal information is sent. In this paper, we intend to develop a new filtering system that continuously monitors the sensitive information in outbound network packets and notifies the internal user whether or not to expose. So we design a filtering system for sensitive information and analyze the implementation results. Thus users visually can check whether disclosure of the important information and drop the corresponding packets by the proposed system. The results of this study can help decrease cyber threats various targeting internal information of company by contributing to prevent exposure of sensitive internal information.