• Title/Summary/Keyword: Mail Security

Search Result 181, Processing Time 0.024 seconds

A Study on XML/EDI System Security using XML Signature (XML 전자서명을 이용한 XML/EDI 시스템 보안에 관한 연구)

  • 이경록;서장훈;박명규
    • Journal of the Korea Safety Management & Science
    • /
    • v.4 no.1
    • /
    • pp.57-68
    • /
    • 2002
  • As Internet spreads rapidly, the industrial structure is changing to a new paradigm. The previous EDI system was asked to change and WEB EDI, E-Mail EDI, FTP EDI etc. which are based on the internet appeared. These days the XML/EDI which has XML document appeared. The XML/EDI consider advantages and disadvantages of VAN/EDI and EDI which based on the internet. Also, EDI system has to assure a safe exchange between sender and receiver. But, the internet has security problems because it uses a open TCP/IP protocol. Although there are many methods for security, it is being studied with XML concept. On this paper, we will suppose the XML/EDI system model with XML Signature, and build a procedure of electronic signature and delivery of document between sender and receiver.

A Study on Mail Cryptography System using the ARIA (ARIA를 이용한 메일 암호시스템에 관한 연구)

  • Kim, Hee-Jung;Gu, Bon-Yeol;Sin, Seung-Su;Han, Kun-Hee
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.05a
    • /
    • pp.77-80
    • /
    • 2010
  • 일반적인 메일 시스템은 제 3자의 악의적인 목적으로 메일의 내용을 열람했을 경우 모든 내용이 그대로 노출 된다는 위험성을 내포하고 있다. 이러한 문제점을 해결하기 위해서, 본 논문에서는 ARIA를 이용한 메일 암호시스템을 제안한다. 제안한 암호시스템은 메일 내용을 송 수신 하는 쌍방 간의 합의된 비밀 키로 암 복호화하여 악의적인 의도로 메일에 접근했을 경우에도 비밀 키가 노출되지 않는 한메일 내용을 알 수 없도록 설계하였다.

  • PDF

Feature-selection algorithm based on genetic algorithms using unstructured data for attack mail identification (공격 메일 식별을 위한 비정형 데이터를 사용한 유전자 알고리즘 기반의 특징선택 알고리즘)

  • Hong, Sung-Sam;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.20 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • Since big-data text mining extracts many features and data, clustering and classification can result in high computational complexity and low reliability of the analysis results. In particular, a term document matrix obtained through text mining represents term-document features, but produces a sparse matrix. We designed an advanced genetic algorithm (GA) to extract features in text mining for detection model. Term frequency inverse document frequency (TF-IDF) is used to reflect the document-term relationships in feature extraction. Through a repetitive process, a predetermined number of features are selected. And, we used the sparsity score to improve the performance of detection model. If a spam mail data set has the high sparsity, detection model have low performance and is difficult to search the optimization detection model. In addition, we find a low sparsity model that have also high TF-IDF score by using s(F) where the numerator in fitness function. We also verified its performance by applying the proposed algorithm to text classification. As a result, we have found that our algorithm shows higher performance (speed and accuracy) in attack mail classification.

Prioritize Security Strategy based on Enterprise Type Classification Using Pair Comparison (쌍대비교를 활용한 기업 유형 분류에 따른 보안 전략 우선순위 결정)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.4
    • /
    • pp.97-105
    • /
    • 2016
  • As information system is getting higher and amount of information assets is increasing, skills of threatening subjects are more advanced, so that it threatens precious information assets of ours. The purpose of this study is to present a strategic direction for the types of companies seeking access to information security. The framework classifies companies into eight types so company can receive help in making decisions for the development of information security strategy depending on the type of company it belongs to. Paired comparison method survey conducted by a group of information security experts to determine the priority and the relative importance of information security management elements. The factors used in the security response strategy are the combination of the information security international certification standard ISO 27001, domestic information protection management system certification K-ISMS, and personal information security management system certification PIMS. Paired comparison method was then used to determine strategy alternative priorities for each type. Paired comparisons were conducted to select the most applicable factors among the 12 strategic factors. Paired comparison method questionnaire was conducted through e-mail and direct questionnaire survey of 18 experts who were engaged in security related tasks such as security control, architect, security consulting. This study is based on the idea that it is important not to use a consistent approach for effective implementation of information security but to change security strategy alternatives according to the type of company. The results of this study are expected to help the decision makers to produce results that will serve as the basis for companies seeking access to information security first or companies seeking to establish new information security strategies.

A Study of Logical Network Partition and Behavior-based Detection System Using FTS (FTS를 이용한 논리적 망 분리와 행위기반 탐지 시스템에 관한 연구)

  • Kim, MinSu;Shin, SangIl;Ahn, ChungJoon;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.109-115
    • /
    • 2013
  • Security threats through e-mail service, a representative tool to convey information on the internet, are on the sharp rise. The security threats are made in the path where malicious codes are inserted into documents files attached and infect users' systems by taking advantage of the weak points of relevant application programs. Therefore, to block infection of camouflaged malicious codes in the course of file transfer, this work proposed an integrity-checking and behavior-based detection system using File Transfer System (FTS), logical network partition, and conducted a comparison analysis with the conventional security techniques.

Forensic Investigation Procedure for Real-time Synchronization Service (실시간 동기화 서비스에 대한 포렌식 조사 절차에 관한 연구)

  • Lee, Jeehee;Jung, Hyunji;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1363-1374
    • /
    • 2012
  • The number and use of Internet connected devices has dramatically increased in the last several years. Therefore many services synchronizing data in real-time is increasing such as mail, calendar and storage service. This service provides convenience to users. However, after devices are seized, the data could be changed because of characteristic about real-time synchronization. Therefore digital investigation could be difficult by this service. This work investigates the traces on each local device and proposes a method for the preservation of real-time synchronized data. Based on these, we propose the procedures of real-time synchronization data.

A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications (안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구)

  • Kim, Jee Yeon;Jeon, Woong Ryul;Lee, Young Sook;Kim, Mi Joo;Jung, Hyun Chul;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.

A Study on Interface Security Enhancement (조직의 실시간 보안관리 체계 확립을 위한 '인터페이스 보안' 강화에 대한 연구)

  • Park, Joon-Jeong;Kim, Sora;Ahn, SooHyun;Lim, Chae-Ho;Kim, Kwangjo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.5
    • /
    • pp.171-176
    • /
    • 2015
  • Because the specific security technology alone can not cope with sophisticated attacks, various security management models are applied. But, they do not focus on the vulnerability of the highest part because they offer so many common security management criteria. By analyzing the main information and confidential leakage cases inflicting enormous damage to our society, we found that attackers are using mainly an interface vulnerabilities - the paths that connect the internal and external of the organization, such as e-mail, web server, portable devices, and subcontractor employees. Considering the reality that time and resources to invest in security domain are limited, we point out the interface security vulnerabilities the possibility of attackers to exploit and present a convergence method of security measures. Finally, based of ROI(Return on Investment), we propose the real-time security management system through the intensive and continuous management.

이메일 클라우드 보안 서비스(E-mail SecaaS)의 기술적 보안위협 연구 - 위협모델링 기법을 중심으로 -

  • KIM, Hye-Won;Yu, Ho-Jun;Lee, Jae-Woo
    • Review of KIISC
    • /
    • v.27 no.6
    • /
    • pp.57-64
    • /
    • 2017
  • 현재 클라우드 컴퓨팅 시장은 빠른 속도로 광범위해지고 있으며 몇몇 기업에서는 클라우드를 이용한 보안서비스를 제공하기 시작했다. 그 중 이메일 클라우드 보안 서비스는 클라우드 컴퓨팅의 특징을 가지고 안전한 조직의 이메일 사용을 지원하고 있다. 여러 조직의 이메일 데이터가 한 곳으로 집중되는 만큼 서비스 공급자는 보다 안전하고 가용성 높은 서비스를 제공해야만 한다. 이를 위해 본 논문에서는 이메일 클라우드 보안 서비스 기본구조를 기반으로 STRIDE 위협모델링 분석을 통해 잠재적인 기술적 보안약점 및 위협을 살펴보고 공격트리를 구성하여 대응방안을 모색해보고자 한다.

전자 우편 시스템의 보호 방식 분석

  • Hong, Ju-Young;Yoon, Yi-Joong;Kim, Dae-Ho
    • Review of KIISC
    • /
    • v.4 no.2
    • /
    • pp.5-17
    • /
    • 1994
  • 전자 우편 시스템은 컴퓨터와 네트워크를 이용하는 이용자들이 가장 빈번히 사용하고 있는 서비스 중의 하나로서 그 이용률은 매년 급증하고 있으며 이와 더불어 교류되는 정보에 대한 보호 및 안전성에 대한 요구도 제기되고 있다. 본 고에서는 이러한 전자 우편 시스템에 보호 서비스를 제공하기 위한 여러 제안된 방식들중에 X.400 MHS과 Internet의 PEM(Privacy Enhanced Mail),미국의 SDNS MSP(Message Secure Protocol)에 관하여 각각의 보호 서비스 제공 방식과 보호 서비스의 유형, 범위, 특성들을 논의하며 이들 접근 방식간의 관련성과 차이점들을 분석하고자 한다.

  • PDF