• 제목/요약/키워드: Network security infrastructure

검색결과 430건 처리시간 0.023초

Network intrusion detection method based on matrix factorization of their time and frequency representations

  • Chountasis, Spiros;Pappas, Dimitrios;Sklavounos, Dimitris
    • ETRI Journal
    • /
    • 제43권1호
    • /
    • pp.152-162
    • /
    • 2021
  • In the last few years, detection has become a powerful methodology for network protection and security. This paper presents a new detection scheme for data recorded over a computer network. This approach is applicable to the broad scientific field of information security, including intrusion detection and prevention. The proposed method employs bidimensional (time-frequency) data representations of the forms of the short-time Fourier transform, as well as the Wigner distribution. Moreover, the method applies matrix factorization using singular value decomposition and principal component analysis of the two-dimensional data representation matrices to detect intrusions. The current scheme was evaluated using numerous tests on network activities, which were recorded and presented in the KDD-NSL and UNSW-NB15 datasets. The efficiency and robustness of the technique have been experimentally proved.

The Impact of Applying Technical Equipment on the Quality of e-Learning at Northern Border University

  • Alenezi, Dr. Ahmed Maajoon
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.261-271
    • /
    • 2022
  • The study aimed to identify the impact of the application of technical equipment for infrastructure to achieve the quality of e-learning for students in the faculties at Northern Border University, in Arar city. The study applied the analytical survey study method. To achieve the study purpose, the researcher prepared a study tool which is a questionnaire to measure the impact o of applying technical instrument for the infrastructure to achieve the quality of e-learning for students. The study sample size reached (218) students from both groups from the university faculties in Arar city. The results of the study revealed a tendency in the study sample's responses to the availability of the majority of the questionnaire criteria significantly. This indicates the positive impact of the application of technical equipment on the infrastructure to achieve the application quality of e-learning at Northern Border University, the study recommended the following: The need to pay attention to measuring the quality of electronic courses every two years in addition to the need to adjust the quality standards of e-content provided through e-learning platforms. Also, there is the gradual application of e-learning at the university in addition to spreading the culture of e-learning quality among all groups of the university community. Also, it is necessary to direct them towards benefiting from the advantages of e-learning that observes quality standards.

Attacks, Vulnerabilities and Security Requirements in Smart Metering Networks

  • Hafiz Abdullah, Muhammad Daniel;Hanapi, Zurina Mohd;Zukarnain, Zuriati Ahmad;Mohamed, Mohamad Afendee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권4호
    • /
    • pp.1493-1515
    • /
    • 2015
  • A smart meter is one of the core components in Advanced Metering Infrastructure (AMI) that is responsible for providing effective control and monitor of electrical energy consumptions. The multifunction tasks that a smart meter carries out such as facilitating two-way communication between utility providers and consumers, managing metering data, delivering anomalies reports, analyzing fault and power quality, simply show that there are huge amount of data exchange in smart metering networks (SMNs). These data are prone to security threats due to high dependability of SMNs on Internet-based communication, which is highly insecure. Therefore, there is a need to identify all possible security threats over this network and propose suitable countermeasures for securing the communication between smart meters and utility provider office. This paper studies the architecture of the smart grid communication networks, focuses on smart metering networks and discusses how such networks can be vulnerable to security attacks. This paper also presents current mechanisms that have been used to secure the smart metering networks from specific type of attacks in SMNs. Moreover, we highlight several open issues related to the security and privacy of SMNs which we anticipate could serve as baseline for future research directions.

네트워크 가상화 기반 클라우드 보안 구성에 관한 연구 (A study on Cloud Security based on Network Virtualization)

  • 홍상범;김성철;이미화
    • 융합보안논문지
    • /
    • 제23권5호
    • /
    • pp.21-27
    • /
    • 2023
  • 클라우드 컴퓨팅 환경에서 서버나 애플리케이션들이 수 분 사이에 구축되고 장애 발생 시 복구 또한 쉬워졌다. 특히, 잠시 서비스하기 위해서 물리적인 서버를 구축하는 것 보다 클라우드에서 가상 서버를 이용하면 편리함과 동시에 비용도 저렴하다. 하지만 그러한 서버나 애플리케이션들의 기반이 되는 네트워크나 보안시스템은 대부분 하드웨어 기반으로 구성되어 있어 클라우드 가상화 적용에 어려움이 많다. 클라우드 내에서도 네트워크나 보안설비 등에 대한 가상화를 통한 보호가 필요하게 되었다. 본 논문은 네트워크 가상화 기술을 활용하여 클라우드 네트워크의 보안을 강화하는 방법에 대한 연구를 다루고 있다. 가상 서버 및 가상 네트워크를 생성해 다양한 보안 이점을 제공하는 가상화 기술을 활용해 링크 가상화와 라우터 가상화를 적용하여 보안이 강화된 네트워크를 구성하였다. 구성된 네트워크에 가상 방화벽 기능을 적용해 네트워크를 격리할 수 있었으며, 이 결과를 토대로 가상화 환경에서 보안 취약점을 극복하고 안전한 네트워크 구성을 위한 관리 전략을 제안하는데 기여할 것으로 기대된다.

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • 제24권3호
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

네트워크 취약점 검색공격 탐지 시스템을 위한 안전한 통신 프레임워크 설계 (A Secure Communication Framework for the Detection System of Network Vulnerability Scan Attacks)

  • 유일선;김종은;조경산
    • 정보처리학회논문지C
    • /
    • 제10C권1호
    • /
    • pp.1-10
    • /
    • 2003
  • 본 논문에서는 취약점 검색공격 탐지시스템 DS-NVSA(Detection System of Network Vulnerability Scan Attacks)에서 서버와 에이전트들 사이의 상호연동을 위한 안전한 통신 프레임워크를 제안한다. 기존 시스템과의 상호연동을 위하여 제안 프레임워크는 IETF의 IDWG에서 제안한 IDMEF와 IAP를 확장 적용하였다. 또한 공개키 기반의 환경을 지원하지 못하는 네트워크 시스템을 위해 대칭키 기반의 암호화 통신 프로토콜 SKTLS(Symmetric Key based Transport Layer Security Protocol)를 제시하였다. 제안된 프레임워크는 DS-NVSA 이외에도 기존의 이기종 침입탐지 시스템의 제사용과 탐지 영역의 확대를 제공하며, 또한 기업내 통합 보안환경시스템 ESM(Enterprise Security Management) 시스템에도 적용될 수 있다.

네트워크 접근제어 시스템의 보안성 메트릭 개발 (Development of Security Metric of Network Access Control)

  • 이하용;양효식
    • 디지털융복합연구
    • /
    • 제15권6호
    • /
    • pp.219-227
    • /
    • 2017
  • 네트워크 접근제어(Network Access Control)를 통해 IT 인프라에 대한 보안위협 즉, 비인가 사용자, 단말의 네트워크 무단 접속, 직원의 내부 서버 불법접근 등을 효과적으로 차단할 수있어야 한다. 이러한 관점에서는 보안성을 충족시키고 있음을 확실히 하기 위해 관련 표준에 기반을 둔 메트릭 구축이 요구된다. 그러므로 관련 표준에 따른 NAC의 보안성 평가를 위한 방법의 체계화가 필요하다. 따라서 이 연구에서는 네트워크 접근제어시스템의 보안성 메트릭 개발을 위해 ISO/IEC 15408(CC:Common Criteria)과 ISO 25000 시리즈의 보안성 평가 부분을 융합한 모델을 구축하였다. 이를 위해 네트워크 접근제어시스템의 품질 요구사항을 분석하고 두 국제표준의 보안성에 관한 융합 평가메트릭을 개발하였다. 이를 통해 네트워크 접근제어시스템의 보안성 품질수준 평가 모델을 구축하고, 향후 네트워크 접근제어시스템에 대한 평가방법의 표준화에 적용할 수 있을 것으로 사료된다.

USN 융합기술을 활용한 자전거 시설물의 안전향상에 관한 연구 (A Study on the Improvement Alternatives using USN Technology on Bicycle and Infrastructures)

  • 정성학
    • 한국컴퓨터정보학회논문지
    • /
    • 제15권8호
    • /
    • pp.173-180
    • /
    • 2010
  • 본 연구의 목적은 지능형 교통체계에서 유비쿼터스 센서 네트웍(USN: Ubiquitous Sensor Network)의 융합기술을 활용하여 자전거 시설물의 보안과 안전 기능을 향상하는데 있다. 이러한 목적을 달성하기 위해서 유니버셜 센서 네트웍 기술을 활용하여 U-bike 시스템을 개발하였다. 자전거도로 시설물 안전에 대한 문헌연구를 통하여 유비쿼터스 자전거 교통정보와 서비스 특성을 분석하여 USN을 활용한 자전거 및 시설물의 안전 인프라 구축 방안을 제시한다. 본 연구결과는 4대강 자전거도로 및 시설물 안전성능을 향상하는데 기여할 것이다.

Routing Protocol using One-Way Hash Functions for Mobile Ad Hoc Networks

  • Park, Young-Ho
    • 한국산업정보학회:학술대회논문집
    • /
    • 한국산업정보학회 2007년도 춘계학술대회
    • /
    • pp.26-31
    • /
    • 2007
  • An ad hoc network is a collection of mobile nodes without any Infrastructure. However, ad hoc networks are vulnerable to attacks such as routing disruption and resource consumption; thus, routing protocol security is needed This paper proposes a secure and efficient routing protocol for mobile ad hoc networks, where only one-way hash function are used to authenticate nodes in the ROUTE REQUEST, while additional public-key cryptography is used to guard against active attackers disguising a node in the ROUTE REPLY.

  • PDF

C-Engineering Based Industry 4.0 Innovation Networks Sustainable Development

  • Omelyanenko, Vitaliy;Braslavska, Oksana;Biloshkurska, Nataliia;Biloshkurskyi, Mykola;Kliasen, Natalia;Omelyanenko, Olena
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.267-274
    • /
    • 2021
  • The article deals with problems of innovation development on a network basis, which require effective mechanisms of innovation communications. In research the organizational aspects of ICT infrastructure development for innovation networks sustainable development based on cooperative marketing principles is considered. The proposed research idea is based on the idea that ICT implementation is based not only on the operational approach for innovation management as a factor of efficiency of internal communications, but also on knowledge economy and post-industrial economy trends. Therefore, the purpose of study is to develop an ICT model of innovation infrastructure to improve its effectiveness (strategic character) and efficiency (operative character) through increasing the efficiency of network communication interactions. Creation of information space and communication tools to support innovation network sustainable development and cooperation activities in research is proposed to be solved with the help of specialized ICT platform. It is shown, that ICT platform of innovation cooperation innovation network is important tool for common work of participants. ICT platform is considered as an integrated information system designed to automate business processes related to the sustainable development of innovation network, segment management and integration with HEI information systems and industrial cooperation. The main factors that determine the need to use a special ICT platform for innovation network cooperation were considered. The main issues of concurrent engineering (C-technology) application in high-technology industries and innovation cooperation for integrated product development were studied.