• Title/Summary/Keyword: Network Security Monitoring

Search Result 361, Processing Time 0.029 seconds

A Sensor Network Security Protocol for Monitoring the State of Bridge (교량감시를 위한 센서 네트워크 보안프로토콜)

  • Lim, Hwa-Jung;Jeon, Jin-Soon;Lee, Heon-Guil
    • Journal of Industrial Technology
    • /
    • v.25 no.B
    • /
    • pp.211-220
    • /
    • 2005
  • The wireless sensor network consists of a number of sensor nodes which have physical constraints. Each sensor node senses surrounding environments and sends the sensed information to Sink. The inherent vulnerability in security of the sensor nodes has promoted the needs for the lightweight security protocol. In this paper, we propose a non-hierarchical sensor network and a security protocol that is suitable for monitoring the man-made objects such as bridges. Furthermore, we present the efficient way of setting the routing path by storing IDs, MAC(message authentication code) and the location information of the nodes, and taking advantage of the two node states, Sleep and Awake. This also will result in the reduced energy consuming rate.

  • PDF

An Efficient Network Attack Visualization Using Security Quad and Cube

  • Chang, Beom-Hwan;Jeong, Chi-Yoon
    • ETRI Journal
    • /
    • v.33 no.5
    • /
    • pp.770-779
    • /
    • 2011
  • Security quad and cube (SQC) is a network attack analyzer that is capable of aggregating many different events into a single significant incident and visualizing these events in order to identify suspicious or illegitimate behavior. A network administrator recognizes network anomalies by analyzing the traffic data and alert messages generated in the security devices; however, it takes a lot of time to inspect and analyze them because the security devices generate an overwhelming amount of logs and security events. In this paper, we propose SQC, an efficient method for analyzing network security through visualization. The proposed method monitors anomalies occurring in an entire network and displays detailed information of the attacks. In addition, by providing a detailed analysis of network attacks, this method can more precisely detect and distinguish them from normal events.

On the Configuration and Improvement of Security Control Systems (보안관제시스템 구성 및 개선방안 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.69-80
    • /
    • 2017
  • Due to the advanced IT environment, the role of Security Monitoring & Control becomes more important as the cyber-crime is becoming intelligent, diversified, and advanced. In contrast to the way it relied solely on security devices such as Firewall and IDS in the past, Security Monitoring & Control tasks responding to cyber attacks through real-time monitoring have become wide spread and their role is also important. In response to current cyber threats, since security equipment alone can not be guaranteed a stable defense, the task of Security Monitoring & Control became essential to operate and monitor security equipment and to respond in real time. In this study, we will discuss how to configure network security system effectively and how to improve the real-time Security Monitor & Control.

Development of an Indoor Networked Security Robot System (네트워크 기반 실내 감시 로봇 시스템 개발)

  • Park, Keun Young;Heo, Guen Sub;Lee, Sang Ryong;Lee, Choon Young
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.3
    • /
    • pp.136-142
    • /
    • 2008
  • Mobile robots can offer services like intelligent monitoring in an indoor environment using network connection with remote users. In this paper, we designed and developed a networked security robot system with various sensors, such as flame detector, gas detector, sound monitoring module, and temperature sensor, etc. The robot can be accessed through a web service and the user can check the status of the environment. Using ADAMS software, we defined the motor specification for a worst-case condition of climbing over a obstacle. We applied the robot system in monitoring office condition.

  • PDF

Dynamic Monitoring for Security Management based on State Transition (상태 전이에 의한 보안 관리 동적 모니터링)

  • Jang, Hui-Jin;Kim, Sang-Uk
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.12
    • /
    • pp.1468-1475
    • /
    • 1999
  • 컴퓨터망 보안을 위해서는 취약점의 빠른 발견과 그에 따르는 신속한 조치가 요구된다. 이를 위해 컴퓨터망 여러 곳에서 사용자가 원하는 보안 정보를 수집, 분석하고 수집된 보안 정보들을 효과적으로 보여주는 통합적인 보안 관리를 제공하는 모니터링 방식이 필요하다. 본 논문에서는 보안 관리를 위한 동적 모니터링 형식 모델을 제시한다. 동적 모니터링은 상태 전이에 의한 시스템 상태, 사용자와의 상호작용, 시각 및 모니터링 객체의 동적 활성화를 이용하여 컴퓨터망 통합 보안 관리를 제공한다. 계속적으로 변하는 보안 정보, 컴퓨터망 관리자의 관심점과 모니터링 레벨의 변화를 즉각적으로 반영함으로써 관리자에게 컴퓨터망 관리의 정확성, 효율성 그리고 편의성을 제공한다. 모니터링 시스템을 형식적으로 모델링하여 여러 모니터링 응용프로그램의 개발이 가능한 모니터링 플랫폼으로 발전시킬 수 있다. Abstract It is highly required to quickly detect the vulnerability of a computer network system and an appropriate action toward it should be followed as soon as possible for its security. It leads us to the need of a monitoring schema that can provide an integrated security management with carefully selected and analysed data through the computer network for its users. This paper presents a formal model of dynamic monitoring for security management. It provides the comprehensive security management using continuously changing security information, user interactions and dynamic activation of visual and monitoring objects. It enables system security officers to manage computer systems accurately, efficiently and conveniently by reflecting the state transition and the transformation of concerns and a monitoring level of system security officers immediately. This model can be used as the basis of a monitoring platform.

The development of a ship's network monitoring system using SNMP based on standard IEC 61162-460

  • Wu, Zu-Xin;Rind, Sobia;Yu, Yung-Ho;Cho, Seok-Je
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.10
    • /
    • pp.906-915
    • /
    • 2016
  • In this study, a network monitoring system, including a secure 460-Network and a 460-Gateway, is designed and developed according with the requirements of the IEC (International Electro-Technical Commission) 61162-460 network standard for the safety and security of networks on board ships. At present, internal or external unauthorized access to or malicious attack on a ship's on board systems are possible threats to the safe operation of a ship's network. To secure the ship's network, a 460-Network was designed and implemented by using a 460-Switch, 460-Nodes, and a 460-Gateway that contains firewalls and a DMZ (Demilitarized Zone) with various application servers. In addition, a 460-firewall was used to block all traffic from unauthorized networks. 460-NMS (Network Monitoring System) is a network-monitoring software application that was developed by using an simple network management protocol (SNMP) SharpNet library with the .Net 4.5 framework and a backhand SQLite database management system, which is used to manage network information. 460-NMS receives network information from a 460-Switch by utilizing SNMP, SNMP Trap, and Syslog. 460-NMS monitors the 460-Network load, traffic flow, current network status, network failure, and unknown devices connected to the network. It notifies the network administrator via alarms, notifications, or warnings in case any network problem occurs. Once developed, 460-NMS was tested both in a laboratory environment and for a real ship network that had been installed by the manufacturer and was confirmed to comply with the IEC 61162-460 requirements. Network safety and security issues onboard ships could be solved by designing a secure 460-Network along with a 460-Gateway and by constantly monitoring the 460-Network according to the requirements of the IEC 61162-460 network standard.

Smart Health Monitoring System (SHMS) An Enabling Technology for patient Care

  • Irfan Ali Kandhro;Asif Ali Wagan;Muhammad Abdul Aleem;Rasheeda Ali Hassan;Ali Abbas
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.43-52
    • /
    • 2024
  • Health Monitoring System is a sophisticating technology and another way to the normal/regular management of the health of the patient. This Health Monitoring Mobile Application is a contribution from our side to the public and to the overall health industry in Pakistan. With the help of Health mobile application, the users will be able to store their medical records, prescriptions and retrieve them later. The users can store and keep track of their vital readings (heart rate, blood pressure, fasting glucose, random glucose). The mobile application also shows hospitals that are nearby in case the user wants to avail of any medical help. An important feature of the application is the symptoms-based disease prediction, the user selects the symptoms which he has and then the application will name certain diseases that match those symptoms based on relevant algorithms. The major advances and issues have been discussed, and as well as potential tasks to health monitoring will be identified and evaluated.

Wearable and Implantable Sensors for Cardiovascular Monitoring: A Review

  • Jazba Asad;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.171-185
    • /
    • 2023
  • The cardiovascular syndrome is the dominant reason for death and the number of deaths due to this syndrome has greatly increased recently. Regular cardiac monitoring is crucial in controlling heart parameters, particularly for initial examination and precautions. The quantity of cardiac patients is rising each day and it would increase the load of work for doctors/nurses in handling the patients' situation. Hence, it needed a solution that might benefit doctors/nurses in monitoring the improvement of the health condition of patients in real-time and likewise assure decreasing medical treatment expenses. Regular heart monitoring via wireless body area networks (WBANs) including implantable and wearable medical devices is contemplated as a life-changing technique for medical assistance. This article focuses on the latest development in wearable and implantable devices for cardiovascular monitoring. First, we go through the wearable devices for the electrocardiogram (ECG) monitoring. Then, we reviewed the implantable devices for Blood Pressure (BP) monitoring. Subsequently, the evaluation of leading wearable and implantable sensors for heart monitoring mentioned over the previous six years, the current article provides uncertain direction concerning the description of diagnostic effectiveness, thus intending on making discussion in the technical communal to permit aimed at the formation of well-designed techniques. The article is concluded by debating several technical issues in wearable and implantable technology and their possible potential solutions for conquering these challenges.

A Survey on Key Management Strategies for Different Applications of Wireless Sensor Networks

  • Raazi, Syed Muhammad Khaliq-Ur-Rahman;Lee, Sung-Young
    • Journal of Computing Science and Engineering
    • /
    • v.4 no.1
    • /
    • pp.23-51
    • /
    • 2010
  • Wireless Sensor Networks (WSN) have proved to be useful in applications that involve monitoring of real-time data. There is a wide variety of monitoring applications that can employ Wireless Sensor Network. Characteristics of a WSN, such as topology and scale, depend upon the application, for which it is employed. Security requirements in WSN vary according to the application dependent network characteristics and the characteristics of an application itself. Key management is the most important aspect of security as some other security modules depend on it. We discuss application dependent variations in WSN, corresponding changes in the security requirements of WSN and the applicability of existing key management solutions in each scenario.

Establishment of a secure networking between Secure OSs

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2097-2100
    • /
    • 2003
  • Many studies have been done on secure operating system using secure kernel that has various access control policies for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policies like DAC(Discretionary Access Control), MAC(Mandatory Access Control), RBAC(Role Based Access Control), and so on. But, even if secure operating system is running under various access control policies, network traffic among these secure operating systems can be captured and exposed easily by network monitoring tools like packet sniffer if there is no protection policy for network traffic among secure operating systems. For this reason, protection for data within network traffic is as important as protection for data within local system. In this paper, we propose a secure operating system trusted channel, SOSTC, as a prototype of a simple secure network protocol that can protect network traffic among secure operating systems and can transfer security information of the subject. It is significant that SOSTC can be used to extend a security range of secure operating system to the network environment.

  • PDF