• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.03 seconds

Virtual Network Embedding through Security Risk Awareness and Optimization

  • Gong, Shuiqing;Chen, Jing;Huang, Conghui;Zhu, Qingchao;Zhao, Siyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.2892-2913
    • /
    • 2016
  • Network virtualization promises to play a dominant role in shaping the future Internet by overcoming the Internet ossification problem. However, due to the injecting of additional virtualization layers into the network architecture, several new security risks are introduced by the network virtualization. Although traditional protection mechanisms can help in virtualized environment, they are not guaranteed to be successful and may incur high security overheads. By performing the virtual network (VN) embedding in a security-aware way, the risks exposed to both the virtual and substrate networks can be minimized, and the additional techniques adopted to enhance the security of the networks can be reduced. Unfortunately, existing embedding algorithms largely ignore the widespread security risks, making their applicability in a realistic environment rather doubtful. In this paper, we attempt to address the security risks by integrating the security factors into the VN embedding. We first abstract the security requirements and the protection mechanisms as numerical concept of security demands and security levels, and the corresponding security constraints are introduced into the VN embedding. Based on the abstraction, we develop three security-risky modes to model various levels of risky conditions in the virtualized environment, aiming at enabling a more flexible VN embedding. Then, we present a mixed integer linear programming formulation for the VN embedding problem in different security-risky modes. Moreover, we design three heuristic embedding algorithms to solve this problem, which are all based on the same proposed node-ranking approach to quantify the embedding potential of each substrate node and adopt the k-shortest path algorithm to map virtual links. Simulation results demonstrate the effectiveness and efficiency of our algorithms.

The Design Research on ICT Security Concepts and Domains (ICT기반 보안개념 정의와 범위에 관한 설계연구)

  • Minseo Jeon;Hangbae Chang
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.49-61
    • /
    • 2019
  • As the number of security incidents and damages increase steadily, interest in the security of society is growing, and the amount of academic interest and research is steadily increasing. However, despite these concerns and the quantitative increase in research, the terms 'security' and 'safety' have been mixed and studies have been conducted without the conceptual definition of various security terms being clearly defined. As a result, various forms of security concepts based on ICT environments have been misused. Therefore, we tried to derive the consensus of experts among the various security terms which are mixed in this study, and to summarize the concepts based on the analysis of domestic and foreign documents based on the concept of the terms. Through this research, we intend to contribute to the establishment of the academic identity of security by preventing related mistakes caused by the mixed use of terminology.

Prevention Methods for the Leakage and Crime of Industrial Technique in South Korea: Focused on the CPTED (한국 산업기술 유출 및 범죄 방지 방안: 환경설계를 통한 범죄예방을 중심으로)

  • Lee, Tae-Young;Sung, Yong-Eun
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.151-160
    • /
    • 2015
  • According to the document from the National Industrial Security Center in 2015, from 2003 to 2014 the disclosure number of industrial spy in South Korea was 438, and the damages due to the industrial technology leakages amounted 50 trillion won annually. Because the industrial technology leakage exercises great influence on the enterprises and the country. countermeasures against industrial technology leakages should be established. Therefore, the purpose of this research is to suggest measures preventing industrial technology leakages and related crimes in enterprises by applying the Crime Prevention Through Environmental Design(CPTED) technique. This research analyzed the recent technology leakage cases and used an analysis of literature research. From the result of this research, we suggested 1) Access Control, 2) Surveillance Enhancement, 3) Territoriality of Reinforcement, and 4) Activity Support by applying the CPTED technique for preventing industrial technology leakages. The limitations of this research and the recommendations for future research were discussed at the last part of this research.

A Design and Implementation of the Light-Weight Random Number Generator Using Sensors (센서를 이용한 경량 난수발생기 설계 및 구현)

  • Kang, Hana;Yoo, Taeil;Yeom, Yongjin;Kang, Ju-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.307-315
    • /
    • 2017
  • Random number generator(RNG) is essential in cryptographic applications. As recently a system using small devices such as IoT, Sensor Network, SmartHome appears, the lightweight cryptography suitable for this system is being developed. However due to resource limitations and difficulties in collecting the entropy, RNG designed for the desktop computer are hardly applicable to lightweight environment. In this paper, we propose a lightweight RNG to produce cryptographically strong random number using sensors. Our design uses a Hankel matrix, block cipher as the structure and sensors values as noise source. Futhermore, we implement the lightweight RNG in Arduino that is one of the most popular lightweight devices and estimate the entropy values of sensors and random number to demonstrate the effectiveness and the security of our design.

A Designing Method of Software Architecture for Information Security Business Model Selection using BMO Technique Base (BMO기법을 활용한 정보보안 비즈모델 평가시스템 소프트웨어 아키텍쳐 설계방법)

  • Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.71-77
    • /
    • 2013
  • In our country security industry biz model analysis methodology fragmentary theory exists, but it is hard to find a comprehensive analysis methodology. Biz model analysis IT companies the external factors and internal factors to integrate the information gathered about the comprehensive analysis of the development of an information system are required. Information support system early in the software architecture of the system design decisions early decision as the design, development, testing, maintenance, has a lasting impact on the project as a guideline in the development of a framework of design abstraction. BMO evaluation support information systems architecture designs system purposes. The mission must support the execution. Information system stakeholders to determine the mission and the environment. All information systems architecture shall have architecture. Technology architecture should be documented with each other can be used. Determine the architecture based architecture descriptions are presented.

Design as a Factor in the Formation of Worldview Paradigms in Culture

  • Lopukhova, Natalia;Dementovich, Tetyana;Misheniuk, Anastasiia;Peresunko, Olena;Ternopolska, Yana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.437-442
    • /
    • 2021
  • This article highlights the importance of design in the formation of worldview paradigms in global culture. The research aims to investigate the design development as a part of the culture and its significance in the social development of society and worldview standards. The article uses general scientific methods of cognition, showing the transformation of design in the social and cultural sphere based on scientific and business literature. The research results show the chronology of design development as a factor determining the development of society and its worldview. In particular, the epoch of modernism, classical functionalism, postmodernism, post-industrialism, and digital design show their own particularities of design development. Furthermore, the article reveals the peculiarities of design development and its requirements depending on the development of society, progress, and civilization in general. The question of current and future trends in the development of design as a factor of worldview paradigms in the culture is based on digitalization, globalization, and the formation of design as an independent entity that determines man's place in the world and society.

Design and Implementation of SMS Security System for Mobile Environment

  • Park, Young-Hwan;Park, Hea-Sook
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.221-229
    • /
    • 2004
  • This paper aims at developing communication module and application prcgram for client management module and developing database management module and managing wireless communication facilities for server systems. To construct these aims, we have adapted DES algorithm and researched on encrypting and decrypting module development applicable to SMS Security System and optimize module size and processing speed.

  • PDF

The Design of CALS Security Model (CALS 정보보호 모델 설계)

  • 윤여웅;이정현;이대기;소우영
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1997.11a
    • /
    • pp.368-377
    • /
    • 1997
  • 정보 통신 기술의 발달로 인하여 시ㆍ공간을 초월한 국제 개방화 시대로 접어들면서 각 기업과 국가에서는 국제적인 경쟁력 우위를 선점하고자 CALS를 도입하여 추진 중에 있다. 그러나 CALS 추진에 있어 다양한 문제들이 발생되고 있고 특히, 정보보호 문제는 CALS 추진의 지연 원인이 되고 있으며 안전한 CALS 구축을 위하여 CALS 정보보호에 대한 연구가 요구되고 있다. 본 논문에서는 CALS 정보보호 위협 요소를 비롯한 정보보호 서비스와 메커니즘을 분석하고 안전한 CALS를 구축하기 위한 정보보호 모델을 제시하고자 한다.

  • PDF

A Design Model on Security Service API for Open Distributed Applications (분산 응용을 위한 보안 서비스 API 설계 모델)

  • 김수광;강창구;최용락
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1997.11a
    • /
    • pp.413-428
    • /
    • 1997
  • 본 논문은 개방형 분산 시스템에서 여러 분산 응용 프로그래머들에게 보안 서비스 제공을 위한 설계모델에 대하여 분석한다. 범용 보안 서비스는 응용 프로그래머에게 공통적으로 사용할 수 있는 암호 알고리즘 및 인터페이스를 제공함으로써 프로그래머가 암호 알고리즘을 알지 못하여도 보안 서비스를 제공할 수 있다. 따라서, 본 논문에서는 다양한 응용 환경 또는 시스템 하부 구조에 독립적으로 사용될 수 있는 범용 암호 서비스 구조를 설계하기 위하여 PKI, GSS-API 및 GCS-API를 중심으로 각각 관련된 요구사항과 설계 모델을 분석한다.

  • PDF

A Design and Implementation of EDI Security System (EDI정보보호 시스템 설계 및 구현)

  • 윤이중;이정현;이대기;김대호
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1997.11a
    • /
    • pp.439-459
    • /
    • 1997
  • 본 논문에서는 전자 문서 교환 시스템인 EDI에서의 정보보호 서비스를 제공하는 EDI 정보보호 시스템의 개발 기술에 대하여 언급한다. 이 시스템은 주로 ITU-TX.400 MHS 통신 프로토콜에 기반을 둔 X.435 EDI 정보보호 서비스를 제공함에 그 목적을 두고 있다. 본 논문에서는 정보보호 서비스 처리 시 발생하는 중복되는 작업을 최소화하고 사용 알고리즘을 언제든지 교체 또는 변경할 수 있는 시스템 구조와 기존 EDI시스템의 최소변경만으로 정보보호 시스템 구축이 가능토록 하는 이식성을 극대화하는 정보보호 시스템 모델과 관리 방안을 제시하였다.

  • PDF