• Title/Summary/Keyword: Secure Linux

Search Result 47, Processing Time 0.024 seconds

Dynamic Key Lifetime Change Protocol for Performance Improvement of Virtual Private Networks using IPSec (IPSec을 적용한 가상사설망의 성능개선을 위한 동적 키 재생성 주기 변경 프로토콜)

  • 한종훈;이정우;박성한
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.125-128
    • /
    • 2003
  • In this paper, we propose a dynamic key lifetime change protocol for performance enhancement of virtual private networks using IPSec. The proposed protocol changes the key lifetime according to the number of secure tunnels. The proposed protocol is implemented with Linux 2.4.18 and FreeS/WAN 1.99. The system employing our proposed protocol performs better than the original version in terms of network performance and security.

  • PDF

A study on Secure Socket Layer WEB Acceleration using Linux Kernel Thread (리눅스 커널에서 구현한 웹서버 암호화 가속 기법에 대한 연구)

  • Hwang, Jun;Min, Byung-Jo;Nahm, Eui-Seok;Kim, Hag-Bae;Chang, Whie
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11a
    • /
    • pp.489-492
    • /
    • 2002
  • 인터넷 전자 상거래의 폭발적 증가와 더불어 개인 및 기업의 정보가 온라인 상으로 유출되는 경우가 증가하고 있다. 이에 따라. 새로운 하드웨어의 추가 없이 프로토콜 및 알고리즘의 변화에 유연한 인터넷 보안방법이 요구되고 있다. 본 논문에서는 사용자 영역과 상관없는 커널 스레드를 사용하고 커널 영역으로 포팅된 라이브러리를 참조하여 사용자의 웹 페이지 요청을 처리함으로써 응답시간과 서버 부하를 감소시키는 새로운 SSL(Secure Socket Layer) 처리 구조를 제안한다.

  • PDF

Remote Integrated Management System for applying Efficient Security Policy based on Linux (리눅스 기반의 효율적인 보안 정책 적용을 위한 원격통합관리시스템)

  • 김동환;김현성
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2002.11a
    • /
    • pp.72-81
    • /
    • 2002
  • Management for security product and application is becoming more difficult because they became more specialized. Most of research is focused on combining policies for information security management policy, security standard, and security tools. However, there are no researches for total solution for both application and security policy. Thereby, the purpose of this research is to propose a remote integrated management system based on linux. The system could efficiently manage data update for application and policy update for a server supporting the distinct configuration of each server. By using the remote integrated management system, system manager with poor secure knowledge also could easily manage their system securely.

  • PDF

A Design of Secure Embedded Linux using Light-weighted Type Enforcement (경량화된 타입 강제를 이용한 안전한 Embedded Linux의 설계)

  • Park, Sung-Jin;Ha, Hong-Joon;Lee, Chang-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1123-1126
    • /
    • 2005
  • 여러 임베디드 시스템 운영체제 중에서 임베디드 리눅스는 다양한 오픈 소스 S/W를 사용할 수 있고, 다양한 임베디드 시스템에 이식할 수 있다는 장점 때문에 널리 사용되고 있다. 하지만, 임베디드 리눅스는 리눅스의 기본 접근제어 메커니즘인 임의적 접근제어(Discretionary Access Control, DAC) 기법을 그대로 사용하고 있어서 사용자의 Identity가 도용 당하거나 Trojan Horse와 같은 프로그램이 설치될 경우, 접근제어가 효력을 상실하게 된다는 결점을 가지고 있다. 더욱 문제가 되는 것은 DAC의 특성상, 프로세스가 필요 이상의 과도한 특권을 가지고 실행되며, 그 결과 잘못된 프로세스가 그 자신과 관계 없는 프로그램이나 운영체제의 커널마저 손상시키는 결과를 낳을 수 있다는 것이다. 이에 따라 보다 강건한 접근제어 메커니즘에 대한 연구의 필요성이 대두되고 있다. 본 논문에서는 임베디드 리눅스 운영체제의 접근제어 메커니즘이 가지고 있는 보안적 결점에 대해서 알아보고, 이 결점을 보완하기 위해 타입 강제(Type Enforcement, TE) 기법을 사용함으로써, 임베디드 시스템에 적합하면서 강력한 접근제어를 제공할 수 있는 안전한 임베디드 리눅스 시스템에 대한 설계 모델을 보여주고자 한다.

  • PDF

Remote Integrated Management System for Applying Efficient Security Policy based on Linux (리눅스 기반의 효율적인 보안 정책 적용을 위한 원격통합관리시스템)

  • 김동환;김현성
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.11a
    • /
    • pp.72-81
    • /
    • 2002
  • Management for security product and application is becoming more difficult because they became more specialized. Most of research is focused on combining policies for information security management policy, security standard, and security tools. However, there are no researches for total solution for both application and security policy. Thereby, the purpose of this research is to propose a remote integrated management system based on linux. The system could efficiently manage data update for application and policy update for a server supporting the distinct configuration of each server. By using the remote integrated management system, system manager with poor secure knowledge also could easily manage their system securely.

  • PDF

A Dynamic Key Lifetime Change Algorithm for Performance Improvement of Virtual Private Networks (가상사설망의 성능개선을 위한 동적 키 재생성 주기 변경 알고리즘)

  • HAN, Jong-Hoon;LEE, Jung Woo;PARK, Sung Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.10 s.340
    • /
    • pp.31-38
    • /
    • 2005
  • Ipsec is a security protocol suite that provides encryption and authentication services for IP messages at the network layer of the internet. Internet Key Exchange (IKE) is a protocol that is used to negotiate and provide authenticated keying materials in a protected manner for Security Associations (SAs). In this paper, we propose a dynamic key lifetime change algorithm for performance enhancement of virtual private networks using IPSec. The proposed algorithm changes the key lifetime according to the number of secure tunnels. The proposed algorithm is implemented with Linux 2.4.18 and FreeS/WAN 1.99. The system employing our proposed algorithm performs better than the original version in terms of network performance and security.

A Novel Authentication Protocol based on the Password scheme for Wireless Mesh Network (무선 메쉬 네트워크의 패스워드 기반 인증 프로토콜)

  • Lee, Kyu-Hwan;Lee, Ju-A;Kim, Jae-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.5
    • /
    • pp.54-62
    • /
    • 2007
  • We propose a novel authentication protocol for wireless mesh network. The proposed authentication protocol is based on the password scheme for convenience of users. The proposed protocol is evaluated through three analyses. The correctness of the proposed protocol is proved using the GNY analysis. By the security analysis, we show that the proposed protocol is resistant to various attacks. For the performance analysis, we implemented the protocol in Linux operating system based laptop and measured the transmission time. The analytic results show that the proposed protocol provides the secure wireless mesh network without considerable performance degradation.

A Study on the Software Simulation Test of the Joint Tactical Data Link System Using the Linux Container Environment (LXC 환경을 이용한 한국형 합동 전술데이터링크체계의 소프트웨어 모의시험에 관한 연구)

  • Hyeong-Seok Ham;Young-Hoon Goo;Dae-Young Song
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1125-1132
    • /
    • 2023
  • The importance of networks is gradually expanding in the battlefield environment. As time goes by, the types of tactical data links used in the Korean JTDLS are increasing, and the military's weapon systems equipped with tactical data link systems are increasing. Thorough quality verification is required to provide stable software to the wider battlefield. This study examines how to prepare an environment in which various simulation tests to verify the stability of the Korean JTDLS project can be conducted as diverse as possible using minimal physical space and Hardware resources. Through this, it is possible to improve the completeness of the project and secure the stability of the program, and it is intended to contribute to securing higher stability and reliability by securing maximum test capabilities in a limited test environment even in Linux based system project of a similar environment.

An Access Control Security Architecture for Secure Operating System supporting Flexible Access Control (유연한 접근통제를 제공하는 보안 운영체제를 위한 접근통제 보안구조)

  • Kim Jung-Sun;Kim Min-Soo;No Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.55-70
    • /
    • 2006
  • In this paper, we propose a new access control security architecture for supporting flexibility in Secure Operating Systems. By adding virtual access control system layer to the proposed security architecture, various access control models such as MAC, DAC, and RBAC can be applied to Secure Operating Systems easily. The proposed security architecture is designed to overcome the problem of Linux system's base access control system. A policy manager can compose various security models flexibly and apply them to Operating Systems dynamically. Also, the proposed architecture is composed of 3 modules such as access control enforcement, access control decision, and security control. And access control models are abstracted to hierarchy structure by virtual access control system. And, we present the notation of policy conflict and its resolution method by applying various access control model.

Design of Access Control for Secure Linux OS and its Implementation (안전한 리눅스 운영체제를 위한 접근제어 설계 및 구현)

  • 고종국;두소영;은성경;김정녀
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.650-652
    • /
    • 2000
  • 본 논문은 최근에 그 수요가 증가하고 있는 리눅스를 기반으로 하여 안전한 운영체제의 설계 및 구현에 대하여 기술한다. 안전한 운영체제를 위해 사용되는 보안 기능들은 MAC(Mandatory Access Control), DAC(Discretionary Access Control), 그리고 SOP(Separate of privilege)과 같이 파일, 디렉토리, 그리고 디바이스와 같은 시스템 자원에 대한 접근을 제어하는 기능과 감사 추적(Auditing)기능, 그리고 사용자 인증기능 등이 있다. 접근제어란 컴퓨터자원, 통신자원, 정보자원 등에 대한 허가되지 않는 접근을 막는 것이다 본 논문에서는 리눅스 운영체제의 보안을 위해 필요한 접근 제어 기능과 다중 레벨의 사용자 인증기능의 설계 및 구현에 대해 기술한다. 또한 접근 제어기능 구현은 국제 표준화인 OSIX1003.le을 기준으로 하였다.

  • PDF