• Title/Summary/Keyword: Security SoC

Search Result 198, Processing Time 0.026 seconds

An Integrated Intrusion Detection System for a Large-scale Network Environment (대규모 네트워크 환경을 위한 통합 침입탐지 시스템)

  • 안정모;조진성;정병수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.985-996
    • /
    • 2004
  • In order to solve the increasing security problems, IDSs(Intrusion Detection System) have appeared. However, local IDSs have a limit to detect various intrusions in a large-scale network environment. So there are a lot of researches in progress which organize the elements of IDS in a distributed or hierarchical manner. In this paper, we design a integrated IDS which exchanges messages between them through the standardized message format (IDMEF) and communication protocol (IDXP). We also propose a policy profile for an effective control of IDSs, and employ the PKI mechanism for mutual authentication. We implement a prototype system for the proposed IDSs communicating with Snort and analyze its performance.

A Study on the Construction of an Ideal Internet Fashion Cyber Mall Focused on Web Design, Merchandising and Management

  • Hong, In-Sook;Ryu, Jin-Kyeung;Park, Eun-Jung;Lee, Kyung-Ah;Lee, Keum-Hee;Kim, Moon-Sook
    • The International Journal of Costume Culture
    • /
    • v.3 no.3
    • /
    • pp.201-211
    • /
    • 2000
  • The purpose of this study is to pinpoint currently arising issues concerning cyber fashion mall by analysing present status and contents of its web design, management and planning within the limits o business to customer (B2C) commerce, and to suggest a direction for building an ideal fashion mall on the internet. As for the study method, conceptual definitions were given based on previous studies. And a positive study was implemented, in which the cases of 23 chosen cyber fashion malls among 60 or so domestic and foreign malls selling fashion products were found by internet search engines and analysed. Results of the case analysis of cyber fashion malls are as follows : 1) cybermall must provide customers with an integrated service as well as e-commerce. 2) various products assortment and price differentiation must be developed, 3) the techniques of graphics, coloring and texturing, and layout design must be adopted to process and express product information, 4) the legislative system is needed to deal with the security, and 5) design and management of customer oriented interface are needed to process and express product information matter of electronic payment and customer protection. Considering the issues in internet fashion cybermalls, are suggested the important factors that are necessary or web design, planning and management to build an ideal cyber fashion mall. These results will contribute to the development of fashion e-commerce.

  • PDF

Subjectivity Study on Cloud-based Smart Work Service of a Quasi-Governmental Agency (준 정부기관 C공단의 클라우드 기반 스마트워크 서비스 유형화 연구)

  • Song, In Kuk
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.113-123
    • /
    • 2014
  • Many people expect remarkable growth in Cloud Computing industry because of it's effectiveness. But Cloud Computing industry is still at an early stage. Especially, people who in the public sector hesitate to adopt Cloud Computing Services due to security issues and their conservative views. Also, they just have limited understanding, so we need to investigate what they really know and understand. The purpose of this study is to propose Improvement plans on cloud-based smart work service of a quasi-governmental agency based on the view point of preference and tendency. To discover three types of cloud-based smart work issues and interpret theoretical definitions of those, we conducted a subjectivity analysis through qualitative methodology. At the result, the study draws three elements of typology: convenience type, concentration type, and collaboration type, and provides directions to strategic-policy studies for future cloud-based smart work services of quasi-governmental agency.

Research on Malware Classification with Network Activity for Classification and Attack Prediction of Attack Groups (공격그룹 분류 및 예측을 위한 네트워크 행위기반 악성코드 분류에 관한 연구)

  • Lim, Hyo-young;Kim, Wan-ju;Noh, Hong-jun;Lim, Jae-sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.193-204
    • /
    • 2017
  • The security of Internet systems critically depends on the capability to keep anti-virus (AV) software up-to-date and maintain high detection accuracy against new malware. However, malware variants evolve so quickly they cannot be detected by conventional signature-based detection. In this paper, we proposed a malware classification method based on sequence patterns generated from the network flow of malware samples. We evaluated our method with 766 malware samples and obtained a classification accuracy of approximately 40.4%. In this study, malicious codes were classified only by network behavior of malicious codes, excluding codes and other characteristics. Therefore, this study is expected to be further developed in the future. Also, we can predict the attack groups and additional attacks can be prevented.

Analysis of abnormal traffic controller deployed in Internet access point (인터넷 액세스점에서의 이상 트래픽 제어기 성능분석)

  • Kim Kwangsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1C
    • /
    • pp.107-115
    • /
    • 2005
  • ATC (Abnormal traffic controller) is presented as next generation security technology to securely support reliable Internet service and to guarantee network survivability, which is deployed in Internet access point. The key concept of the ATC is abnormal traffic monitoring and traffic control technology. When fault factors exist continuously and/or are repeated, abnormal traffic control guarantees service completeness as much as possible. The ATC with control policy on abnormal traffic is superior to the ATC with blocking policy as well as conventional network node, when the ratio of effective traffic to abnormal traffic is higher than $30{\%}.$ When traffic intended unknown attack occurs, network IDS is high false positive probability and so is limited to apply. In this environment, the ATC can be a key player to help the network node such as router to control abnormal traffic.

A Study of Java-based PKI System for Secure Authentication on Mobile Devices (모바일 단말기 상에서 안전한 인증을 위한 자바 기반의 PKI 시스템 연구)

  • Choi, Byeong-Seon;Kim, Sang-Kuk;Chae, Cheol-Joo;Lee, Jae-Kwang
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.331-340
    • /
    • 2007
  • Mobile network environments are the environments where mobile devices are distributed invisible in our daily lives so that we can conventionally use mobile services at my time and place. The fact that we can work with mobile devices regardless of time and place, however, means that we are also in security threat of leaking or forging the information. In particular, without solving privacy concern, the mobile network environments which serve convenience to use, harmonized without daily lives, on the contrary, will cause a serious malfunction of establishing mobile network surveillance infrastructure. On the other hand, as the mobile devices with various sizes and figures, public key cryptography techniques requiring heavy computation are difficult to be applied to the computational constrained mobile devices. In this paper, we propose efficient PKI-based user authentication and java-based cryptography module for the privacy-preserving in mobile network environments. Proposed system is support a authentication and digital signature to minimize encrypting and decrypting operation by compounding session key and public key based on Korean standard cryptography algorithm(SEED, KCDSA, HAS160) and certificate in mobile network environment. Also, it has been found that session key distribution and user authentication is safety done on PDA.

An Authentication and Handoff Mechanism using AAA and HMIPv6 on NEMO Environment (이동 네트워크(NEMO)에서 HMIPv6를 적용한 AAA 인증 방안 연구)

  • Choi, Kyung;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.165-182
    • /
    • 2009
  • Mobile IPv6 spends considerable bandwidth considering that its signal volume is proportional to the mobile and also it should be strengthened to support the binding signal volume, the traffic, and effective mobility. So, the study in NEMO(Network Mobility), an extended version of Mobile IPv6, has been conducted. NEMO provides its mobility by putting several mobiles and more than one portable router into one unit called as mobile network. Because nodes access Internet via the portable router at this time, it receives transparency without any additional work and that much reduces binding signal while solving binding storm. By supporting mobility, NEMO is able to have various mobile structures which realize several networks hierarchically and it is necessary to improve its safety and security by authenticating among the upper networks or the lower ones while moving. Also, it is extremely required to begin a study in the device to improve efficiency accompanied with mobility, which is executed by the fast hand-off as well as the safe authentication. For those reasons, this paper not only classifies various NEMO mobile scenarios into 7 ways, but also provides AAA authentication of each scenario, the authentication through the safety authentication and fast handoff authentication using F+HMIPv6 and the way to reduce both signaling volume and packet delays efficiently during the handoff.

A Fast String Matching Scheme without using Buffer for Linux Netfilter based Internet Worm Detection (리눅스 넷필터 기반의 인터넷 웜 탐지에서 버퍼를 이용하지 않는 빠른 스트링 매칭 방법)

  • Kwak, Hu-Keun;Chung, Kyu-Sik
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.821-830
    • /
    • 2006
  • As internet worms are spread out worldwide, the detection and filtering of worms becomes one of hot issues in the internet security. As one of implementation methods to detect worms, the Linux Netfilter kernel module can be used. Its basic operation for worm detection is a string matching where coming packet(s) on the network is/are compared with predefined worm signatures(patterns). A worm can appear in a packet or in two (or more) succeeding packets where some part of worm is in the first packet and its remaining part is in its succeeding packet(s). Assuming that the maximum length of a worm pattern is less than 1024 bytes, we need to perform a string matching up to two succeeding packets of 2048 bytes. To do so, Linux Netfilter keeps the previous packet in buffer and performs matching with a combined 2048 byte string of the buffered packet and current packet. As the number of concurrent connections to be handled in the worm detection system increases, the total size of buffer (memory) increases and string matching speed becomes low In this paper, to reduce the memory buffer size and get higher speed of string matching, we propose a string matching scheme without using buffer. The proposed scheme keeps the partial matching result of the previous packet with signatures and has no buffering for previous packet. The partial matching information is used to detect a worm in the two succeeding packets. We implemented the proposed scheme by modifying the Linux Netfilter. Then we compared the modified Linux Netfilter module with the original Linux Netfilter module. Experimental results show that the proposed scheme has 25% lower memory usage and 54% higher speed compared to the original scheme.

Performance Appraisal and Job Rotation of the Nurse In a General Hospital (간호사 인사관리 제도에 관한 연구)

  • Kwon, Young-Hee;Lee, Myung-Ha
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.5 no.3
    • /
    • pp.425-444
    • /
    • 1999
  • The purpose of this study is to survey evaluation of the nurse on the current Performance Appraisal System. the need for future performance of the nurse and the opinions about the job rotation, and suggest the direction of improvement by obtaining basic data to improve personnel management of the nurse in a hosipial, the subject of the investigation. The study was conducted self-reporting questionniare survey of 330 nurses working at C hospital located in Chonbuk Province and the data was collected from May 4. 1999 through May 14. The research used measuring instrument developed by researcher for evalution about the present performance appraisal. the need for the future performanc appraisal system and the opinion of job rotaion. The analysis of the collected data was computerized using SPSS/PC+ program, calculated frequency, percentage, the mean and standard deviation and used Pearson, s Correlation Coefficients, t-test, chi- square test. Major findings are as follows. 1) As for the purpose of the current performanc appraisal, the appraiser recognized it as a security of promotion standard, while the employee saw it as a means for control as guidance and supervison of work. 2) With regard to use the result of the present performance appraisal, appraiser picked ambiguous appraisal standard, employees recognized unilateral evaluation of superior eliminated the participation of them as the highest priority. 3) In relation to the current criteria for promotion of the nurse, both appraisers and employees placed more weight on the length of clinical than performance appraisal score. 4) There is much possibility of the appraiser making an error to evaluate considering the length of performance appraisal. 5) Both appraisers and employees indicated that prospective result of performance appraisal should be used for the ability development & motivation of the individual. 6) Concerning employee's participation for performance appraisal both sides wanted by far more participation. 7) Regarding the most ideal appraisal method, both parties favored most the way added up the evaluation of the head nurse and peer review and followed by the manner the revaluation of the head nurse by considering self-evaluation. 8) As to the individual interview after the appraisal, more than 60% of appraisers responded it's not necessary, while above 88.5% of employees answered it is essential so that it is showed significantly difference between the appraisers and the employees. 9) As far as open of the evaluation result is concerned. 75% of the appraiser were against it but 80% of the employee were for it so that it showed significantly between them. The most principal reason that the employee want is that it motivates the individual's ability development and the fairness of the appraisal increases. 10) Whether the periodical rotation is necessary or not, 80% of appraisers and employees answered it's necessary, however, over 70% of them did not want the rotation. 11) Work-group Cohesiveness level within the nursing unit was attentive different from desire of the rotation, that is, the work group cohesiveness level of nurses wanting rotation was significantly lower than that of the group not desiring it.

  • PDF

Effect of Highly Pressurized Hydrogen Gas on Tensile Properties of a Low-Alloy Steel Used for Manufacturing CNG Storage Vessels (CNG 저장용기용 저합금강의 인장 특성에 미치는 고압 수소가스의 영향)

  • Lee, H.M.;Jeong, I.H.;Park, J.S.;Nahm, S.H.;Han, J.O.;Lee, Y.C.
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.36 no.8
    • /
    • pp.829-833
    • /
    • 2012
  • SNG (synthetic natural gas or substitute natural gas) could contribute greatly toward energy security. In addition, HCNG (or $H_2CNG$) is expected to be used as a fuel gas for internal combustion engines and home appliances because it has extremely low emissions and high thermal efficiency. However, the hydrogen contained in SNG or HCNG can deteriorate the mechanical properties of the materials used in existing natural gas infrastructure. Therefore, it is necessary to investigate the effect of hydrogen on the mechanical properties of such materials so that SNG or HCNG can be transported and distributed safely and reliably. In this study, the effect of highly pressurized hydrogen gas on the tensile properties of a low-alloy steel used for manufacturing CNG storage vessels was investigated using the so-called hollow tensile specimen technique.