• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.036 seconds

A Study on the Open Platform Architecture for the Integrated Utilization of Spatial Information and Statistics (공간정보와 통계정보의 융합 활용을 위한 오픈플랫폼 아키텍처에 관한 연구)

  • Kim, Min-Soo;Yoo, Jeong-Ki
    • Journal of Cadastre & Land InformatiX
    • /
    • v.46 no.2
    • /
    • pp.211-224
    • /
    • 2016
  • Based on the 'Government 3.0', the government opens the public data and encourages the active use in the private sector. Recently, the spatial and statistical information that is one of the public data is being widely used in the various web business as a high value-added information. In this study, we propose an architecture of high-availability, high-reliability and high-performance open platform which can provide a variety of services such as searching, analysis, data mining, and thematic mapping. In particular, we present two different system architectures for the government and the public services, by reflecting the importance of the information security and the respective utilization in the private and public sectors. We also compared a variety of server architecture configurations such as a clustered server configuration, a cloud-based virtual server configuration, and a CDN server configuration, in order to design a cost- and performance-effective spatial-statistical information open platform.

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering Weighted Feature Values (가중 특징 값을 고려한 러프 집합 기반 비정상 행위 탐지방법의 설계 및 평가)

  • Bae, Ihn-Han;Lee, Hwa-Ju;Lee, Kyung-Sook
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.8
    • /
    • pp.1030-1036
    • /
    • 2006
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function considering weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the method that assigns different weighted values to feature attributes depending on importance.

  • PDF

Design and Implementation of Efficient Mitigation against Return-oriented Programming (반환 지향 프로그래밍 공격에 대한 효율적인 방어 기법 설계 및 구현)

  • Kim, Jeehong;Kim, Inhyeok;Min, Changwoo;Eom, Young Ik
    • Journal of KIISE
    • /
    • v.41 no.12
    • /
    • pp.1018-1025
    • /
    • 2014
  • An ROP attack creates gadget sequences which consist of existing code snippets in a program, and hijacks the control flow of a program by chaining and executing gadget sequences consecutively. Existing defense schemes have limitations in that they cause high execution overhead, an increase in the binary size overhead, and a low applicability. In this paper, we solve these problems by introducing zero-sum defender, which is a fast and space-efficient mitigation scheme against ROP attacks. We find a fundamental property of gadget execution in which control flow starts in the middle of a function without a call instruction and ends with a return instruction. So, we exploit this property by monitoring whether the execution is abused by ROP attacks. We achieve a very low runtime overhead with a very small increase in the binary size. In our experimental results, we verified that our defense scheme prevents real world ROP attacks, and we showed that there is only a 2% performance overhead and a 1% binary size increase overhead in several benchmarks.

An efficient hardware implementation of 64-bit block cipher algorithm HIGHT (64비트 블록암호 알고리듬 HIGHT의 효율적인 하드웨어 구현)

  • Park, Hae-Won;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1993-1999
    • /
    • 2011
  • This paper describes a design of area-efficient/low-power cryptographic processor for HIGHT block cipher algorithm, which was approved as standard of cryptographic algorithm by KATS(Korean Agency for Technology and Standards) and ISO/IEC. The HIGHT algorithm, which is suitable for ubiquitous computing devices such as a sensor in USN or a RFID tag, encrypts a 64-bit data block with a 128-bit cipher key to make a 64-bit cipher text, and vice versa. For area-efficient and low-power implementation, we optimize round transform block and key scheduler to share hardware resources for encryption and decryption. The HIGHT64 core synthesized using a 0.35-${\mu}m$ CMOS cell library consists of 3,226 gates, and the estimated throughput is 150-Mbps with 80-MHz@2.5-V clock.

Design of Encryption/Decryption Core for Block Cipher HIGHT (블록 암호 HIGHT를 위한 암·복호화기 코어 설계)

  • Sonh, Seung-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.778-784
    • /
    • 2012
  • A symmetric block cryptosystem uses an identical cryptographic key at encryption and decryption processes. HIGHT cipher algorithm is 64-bit block cryptographic technology for mobile device that was authorized as international standard by ISO/IEC on 2010. In this paper, block cipher HIGHT algorithm is designed using Verilog-HDL. Four modes of operation for block cipher such as ECB, CBC, OFB and CTR are supported. When continuous message blocks of fixed size are encrypted or decrypted, the desigend HIGHT core can process a 64-bit message block in every 34-clock cycle. The cryptographic processor designed in this paper operates at 144MHz on vertex chip of Xilinx, Inc. and the maximum throughput is 271Mbps. The designed cryptographic processor is applicable to security module of the areas such as PDA, smart card, internet banking and satellite broadcasting.

A Design of a Personnel Control System Using RF Tag in Port Facilities (RF 태그를 활용한 항만 내 인원관리 시스템)

  • Cha, Jin-Man;Park, Yeoun-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2581-2585
    • /
    • 2010
  • In the field of network sense for the Ubiquitous environment, the technology of RFID is a significant part. Due to the real time processing of information and the property of network, RFID has been used in service field such as distribution, administrative control of physical distribution, remote measuring device, and security. instead of currently used bar-code. The management system of port facilities using the current RFID technology has the effects of reducing working hours and improvement in data processing, but it is not proper for human resource allocation since it is dominantly worked for physical resources. In this paper, we designed and implemented personnel control system using RFID of 2.4GHz in port facilities which presents a monitoring system for safety operation and increase of efficiency using RFID in order to overcome the limitations and problems of current port operation management techniques.

Design of High Speed Modular Exponentiation Operation Method for RSA Algorithm (RSA 알고리즘 부하 경감을 위한 고속 모듈러 멱승 연산 알고리즘 설계)

  • Kim, Kap-Yol;Lee, Chul-Soo;Park, Seok-Cheon
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.507-512
    • /
    • 2008
  • At a recent, enterprises based on online-service are established because of rapid growth of information network. These enterprises collect personal information and do customer management. If customers use a paid service, company send billing information to customer and customer pay it. Such circulation and management of information is big issue but most companies don't care of information security. Actually, personal information that was managed by largest internal open-market was exposed. For safe customer information management, this paper proposes the method that decrease load of RSA cryptography algorithm that is commonly used for preventing from illegal attack or hacking. The method for decreasing load was designed by Binary NAF Method and it can operates modular Exponentiation rapidly. We implemented modular Exponentiation algorithm using existing Binary Method and Windows Method and compared and evaluated it.

A Study on Secure Binding Update Protocol Supporting Mobile Nodes with Constraint Computational Power in Mobile IPv6 Environment (모바일 IPv6 환경에서 제한된 계산 능력을 갖는 모바일 노드를 지원하는 바인딩 갱신 인증 프로토콜에 관한 연구)

  • Choi, Sung-Kyo;You, Il-Sun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.11-25
    • /
    • 2005
  • In MIPv6 environment, an important design consideration for public key based binding update protocols is to minimize asymmetric cryptographic operations in mobile nodes with constraint computational power, such as PDAs and cellular phones, For that, public key based protocols such as CAM-DH. SUCV and Deng-Zhou-Bao's approach provides an optimization to offload asymmetric cryptographic operations of a mobile node to its home agent. However, such protocols have some problems in providing the optimization. Especially, CAM-DH with this optimization does not unload all asymmetric cryptographic operations from the mobile node, while resulting in the home agent's vulnerability to denial of service attacks. In this paper, we improve the drawbacks of CAM-DH. Furthermore, we adopt Aura's two hash-based CGA scheme to increase the cost of brute-force attacks searching for hash collisions in the CGA method. The comparison of our protocol with other public key based protocols shows that our protocol can minimize the MN's computation overhead, in addition to providing better manageability and stronger security than other protocols.

  • PDF

Structural Safety Analysis of Lifting Device for Spent Fuel Dual-purpose Metal Cask (사용후핵연료 금속겸용용기 인양장비의 구조 안전성 해석)

  • Moon, Tae-Chul;Baeg, Chang-Yeal;Yun, Si-Tae;Choi, Byung-Il;Jung, In-Su
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.12 no.4
    • /
    • pp.299-314
    • /
    • 2014
  • A lifting device is used to deal with transport cask for the transportation of spent fuels from nuclear power plants. This study performed theoretical analysis and numerical simulation to evaluate the structural integrity of the lifting device based on Nuclear Safety and Security Commission(NSSC) Notice No.2013-27 and US 10CFR Part 71 ${\S}71.45$. The results of theoretical analysis showed that the maximum stresses of all components were below the allowable values. This result confirmed that the lifting device was structurally safe during operation. The results of finite element analysis also showed that it was evaluated to satisfy the design criteria bothyielding and ultimate condition. All components have been shown to ensure the structural safety due to sufficient safety margins. In other words, the safety factor was 3 or more for the yielding condition and was 5 or more for the ultimate condition.

The Impact of Corporate's Attributes on Corporate Pension Insurance Products & Type Preference (한국 기업 속성에 따른 기업연금보험 상품 및 제도유형 선호도 분석)

  • Joo, Heon
    • The Journal of Industrial Distribution & Business
    • /
    • v.8 no.2
    • /
    • pp.21-31
    • /
    • 2017
  • Purpose - The total amount of advanced Corporate Pension Insurance products exceed 148 trillion Korean Won at the end of 2016. For a firm with over 300 employees, when a bill on compulsion of introduction of Corporate Pension Insurance products, currently pending in court, is passed, Corporate Pension shall be an essential. The findings of the paper will provide a guideline for understanding on firm's attributes and its effects towards introduction of Corporate Pension Insurance products. Research design, data, and methodology - The data were collected using statistics of employer panel survey from Korea Labour Institute in 2013. The study analyses a sample survey on 1,775 outstanding enterprises and their HR department among whole corporations in Korea. For analysis of data, empirical testing by Logistic Regression was utilized. Results - As an outcome of empirical testing, variables on share of regular employees and the aged employees in over 50's generates a significant statistical meaning. It eventually gives a great impact on purchase of Corporate Pension scheme. Moreover, variables on corporate financial statement, current sales, current net income, total amount of the debts, labor cost per person also has a vital influence on introduction of Corporate Pension Insurance products. Lastly, variables on firm's labor relationship have no effect except for the execution or non-execution of HR consulting. Meanwhile, Variables affecting a choice on pension schemes types among firm's attributes are a share of regular employees, current net income, execution or non-execution of HR consulting etc. These variables represents a statistical implication. According to their each features, they prefer DB or DC plan. Conclusions - Introduction of corporate pension scheme is apposite to contemporary Korea's situation entering a hyper-aging society and firms with a high share of regular employees, the weight of aging, current sales, current net income and labor cost per person are exceedingly active in purchasing Corporate Pension Insurance products. However, after the introduction of corporate pension scheme, firms which has an implementation of consultation on human resource management, flexible benefits plan, job security and welfare system prefer DC plan whereas from financial perspective firms with high net income prefer DB plan.