• Title/Summary/Keyword: Secure Log

Search Result 50, Processing Time 0.03 seconds

Efficient Fine-grained Log Auditing using Correlation Method based on Secure OS (Secure OS 기반에서 상호연관 기법을 통한 효과적 상세 로그 감사)

  • Koo, Ha-Sung;Park, Tae-Kyou
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2381-2390
    • /
    • 2011
  • This paper presents the effective and detailed secure monitoring method being used based on Secure OS. For this, the detailed secure log of process, object, user's command and database query in task server are collected by 3 kinds of log collecting module. The log collecting modules are developed by ourselves and contained as constituents of security system. Secure OS module collects process and system secure log of objective unit, Backtracker module collects user's command session log, SQLtracker module collects database query in details. When a system auditor monitors and traces the behaviour of specified user or individual user, the mutual connection method between the secure logs can support detailed auditing and monitering effectively.

Security Audit System for Secure Router

  • Doo, So-Young;Kim, Ki-Young
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1602-1605
    • /
    • 2005
  • An audit tracer is one of the last ways to defend an attack for network equipments. Firewall and IDS which block off an attack in advance are active way and audit tracing is passive way which analogizes a type and a situation of an attack from log after an attack. This paper explains importance of audit trace function in network equipment for security and defines events which we must leave by security audit log. We design and implement security audit system for secure router. This paper explains the reason why we separate general audit log and security audit log.

  • PDF

Design of Secure Log System in Cloud Computing Environment (클라우드 컴퓨팅 환경에서의 안전한 로그 시스템 설계)

  • Lee, Byung-Do;Shin, Sang Uk
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.300-307
    • /
    • 2016
  • Cloud computing that provide a elastic computing service is more complex compared to the existing computing systems. Accordingly, it has become increasingly important to maintain the stability and reliability of the computing system. And troubleshooting and real-time monitoring to address these challenges must be performed essentially. For these goals, the handling of the log data is needed, but this task in cloud computing environment may be more difficult compared to the traditional logging system. In addition, there are another challenges in order to have the admissibility of the collected log data in court. In this paper, we design secure logging service that provides the management and reliability of log data in a cloud computing environment and then analyze the proposed system.

Design and Analysis of the Log Authentication Mechanism based on the Merkle Tree (Merkle Tree 기반의 로그인증 메커니즘 설계 및 분석)

  • Lee, Jung yeob;Park, Chang seop
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.3-13
    • /
    • 2017
  • As security log plays important roles in various fields, the integrity of log data become more and more important. Especially, the stored log data is an immediate target of the intruder to erase his trace in the system penetrated. Several theoretical schemes to guarantee the forward secure integrity have been proposed, even though they cannot provide the integrity of the log data after the system is penetrated. Authentication tags of these methods are based on the linear-hash chain. In this case, it is difficult to run partial validation and to accelerate generating and validating authentication tags. In this paper, we propose a log authentication mechanism, based on Mekle Tree, which is easy to do partial validation and able to apply multi threading.

Effect of Microbial Control on Alfalfa Sprout Vegetable by Depending on Sanitization Method in Kindergarten Foodservice (유치원 급식으로 이용되는 알팔파 새싹채소의 소독방법에 따른 미생물제어 효과)

  • Woo, Suhee
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.4 no.4
    • /
    • pp.109-117
    • /
    • 2016
  • Purpose : This study was designed to provide basic data of effective sanitization method of sprout vegetable for microbiological safety. Methods : Sanitization treatments were performed by dipping the sprout into chlorine and vinegar water. Microbial analysis were composed of the total plate count(TPC) and coliform group count(CGC). Result : Among chlorine water sanitization, the microbial reduction was largest in 100ppm chlorine water, and its TPC and coliform group count decreased to 6.01 log CFU/g and 5.06 log CFU/g. The effective dipping time in 100ppm chlorine water treatment was 5.97 log CFU/g and 5.91 log CFU/g for 30min and 60min, in which TPC were below the microbiological safety limits of 6.00 log CFU/g. Coliform group counts were decreased to 5.44, 5.46, 5.42 log CFU/g in the dipping the spouts for 30min, 60min and 90min. As a result of sanitizing alfalfa spout by vinegar water, a microbial counts tended to decrease with increasing concentration and the dipping time. The effective concentration of vinegar water was 2% for TPC(6.00 log CFU/g) and 1% for coliform group count(5.20 log CFU/g). With 1% vinegar water treatment, TPC became below the microbiological safety limits in all samples and in particular, the sample treated for 60min and 90min(4.93, 4.54 log CFU/g). While coliform group counts were decreased to 3.91 log CFU/g in the dipping the sprouts for 90min, those were still beyond the permitted limit. Conclusion : To secure the food safety of food service facilities including kindergarten feeding, it is considered that along with the systematic study of effective disinfection method for microbiological control at the preconditioning level of spout vegetable within the range of secured maleficence to human body, and the study regarding the measures to lower the initial microbiological pollution of spout vegetable.

Secure Group Communication with Dynamic Membership Change in Ad Hoc Networks

  • Kim, Hee-Youl
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.9
    • /
    • pp.1668-1683
    • /
    • 2011
  • The importance of secure communication between only legitimate group members in ad hoc networks has been growing in recent years. Due to the ad hoc nature the scalability on dynamic membership change is a major concern. However, the previous models require at least O(log n) communication cost for key update per each membership change, which imposes a heavy burden on the devices. In this paper we present a scalable model that supports communication-efficient membership change in ad hoc networks by exclusionary keys and RSA functions. The multicast cost for key update is extremely low, that is O(1) , and one-to-one communications occur mostly in neighboring devices.

The Service Log Analyser for Blocking Unused Account on Internet Services (인터넷 서비스 미 사용 계정 차단을 위한 서비스 로그 분석기)

  • Jung, Kyu-Cheol;Lee, Jin-Kwan;Lee, Dae-Hyung;Jang, Hae-Suk;Lee, Jong-Chan;Park, Ki-Hong
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.73-80
    • /
    • 2007
  • The fact that since Internet has been spreaded widely to people, Many security problems also have been grown too much. Due to sudden growth, administrator's responsibility for secure network and services has been growing more and more. This paper represents how to prevent account which didn't use for long period on multi domains environment using service log analysis. hence administrator can find security hole on systems and can dealing with it. The Service Log Analyzer is that loading log file which are written by each service and analyzing them. as a result it makes a list named Used User List contains a number of account names which uses specific services. When the time has come - means cron job schedule time, User Usage Shifter is the next runner. it's mission is finding the person who didn't used service for a specific period of time. Then modifying the expire day of the account information.

  • PDF

Secure logging system with self-protecting function (자체 보호 기능을 갖는 안전한 로깅 시스템)

  • Kim, Min-Su;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2442-2450
    • /
    • 1999
  • The audit logging system is to write the details of systems use and access on networks. These details are used for trailing the route, when illegal access or using system resource is occurred on networks. The logging system therefore, might be the first target of intruder. We developed the logging system which writes the information of logging and command execution on UNIX system. And we prepared the self-protecting functions of blocking intruder's attack on the logging system. They are protecting the logging process and the log file. To protect the logging process, we made it keep changing the process ID to avoid the intruder's attack. To protect the log file, we use hard link and mandatory file locking, so it can make it impossible to delete or change log file.

  • PDF

A Comparative Analysis on the Export Structure toward U.S. in IT Industry - Korea, Japan, and China (정보통신산업의 대 미국수출구조분석 -한국, 일본, 중국의 비교를 중심으로-)

  • 정해식;안춘모
    • Journal of Korea Technology Innovation Society
    • /
    • v.4 no.3
    • /
    • pp.311-322
    • /
    • 2001
  • This study is on the decomposition analysis of the IT export of Korea, Japan, and China (toward US IT market) by using log mean Divisia method. The analysis shows that the increase in the Korea-US IT exports is the result of not only the increase in the US's IT imports but also the increase in the US's IT market shares. The increases in the Japan-US IT export have shown to be the result of the increase of US's IT import but the market shares have been decreased. The increase in the China-US IT export is the result of the changes in the market shares, changes in IT import structure. and the IT import increase. In order to increase exports toward US markets, Korea have to continue increasing the market share of communication equipments, secure competitive power toward US IT markets with the decline of Japanese's market shares, and secure technical superiority over rising competitive power of Chinas IT industry.

  • PDF

Analysis of Network Log based on Hadoop (하둡 기반 네트워크 로그 시스템)

  • Kim, Jeong-Joon;Park, Jeong-Min;Chung, Sung-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.125-130
    • /
    • 2017
  • Since field control equipment such as PLC has no function to log key event information in the log, it is difficult to analyze the accident. Therefore, it is necessary to secure information that can analyze when a cyber accident occurs by logging the main event information of the field control equipment such as PLC and IED. The protocol analyzer is required to analyze the field control device (the embedded device) communication protocol for event logging. However, the conventional analyzer, such as Wireshark is difficult to process the data identification and extraction of the large variety of protocols for event logging is difficult analysis of the payload data based and classification. In this paper, we developed a system for Big Data based on field control device communication protocol payload data extraction for event logging of large studies.