• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.042 seconds

A Design of Mandatory Access Control Mechanism for Firewall Systems (침입차단시스템을 위한 강제적 접근통제 기법 설계)

  • Kim, Jae-Sung;Hong, Ki-Yoong;Kim, Hak-Beom;Sim, Joo-Geol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.967-974
    • /
    • 1998
  • Access control scheme of the firewall systems protects the systems from threats by using the conventional discretionary access control mechanism. The discretionary access control mechanism is insufficient to control secure information flow on the multievel network. Thus, it is necessary to provide the mandatory access control mechanism to the firewall systems for the multilevel security environment. In this paper, we present a design scheme of the security mechanisms concerning the sensitivity label and the mandatory access control for securely processing the multilevel information.

  • PDF

Design and Evaluation of Function-granularity kernel update in dynamic manner (함수 단위 동적 커널 업데이트 시스템의 설계와 평가)

  • Park, Hyun-Chan;Kim, Se-Won;Yoo, Chuck
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.3
    • /
    • pp.145-154
    • /
    • 2007
  • Dynamic update of kernel can change kernel functionality and fix bugs in runtime. Dynamic update is important because it leverages availability, reliability and flexibility of kernel. An instruction-granularity update technique has been used for dynamic update. However, it is difficult to apply update technique for a commodity operating system kernel because development and maintenance of update code must be performed with assembly language. To overcome this difficulty, we design the function-granularity dynamic update system which uses high-level language such as C language. The proposed update system makes the development and execution of update convenient by providing the development environment for update code which is same for kernel development. We implement this system for Linux and demonstrate an example of update for do_coredump() function which is reported it has a vulnerable point for security. The update was successfully executed.

  • PDF

Design and Implementation of Secure 3-Tier Web Application with Open Source Software

  • Kim, Chang Su;Low, Hooi Yin;Lee, Yong Ju
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.1
    • /
    • pp.33-54
    • /
    • 2010
  • Providing a secure 3-tier Web application has become a high priority for companies as e-businesses have increased the amount and the sensitivity of corporate information that can be accessed through the web. Web applications become more difficult to secure with this very increase in online traffic and transactions. This paper first reviews the 3-tier of web application, types of attacks that can threaten web application services and security principles. We then are designing and implementing a secure web application with open source software that able to mitigate the web application vulnerable to attack.

Prototype Design of Hornet Cloud using Virtual Honeypot Technique (가상 허니팟 기술의 호넷 클라우드의 프로타입 설계)

  • Cha, Byung-Rae;Park, Sun;Kim, Jong-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.8
    • /
    • pp.891-900
    • /
    • 2015
  • Cloud Computing has recently begun to emerge as a new attack target. The malice DDoS attacks are ongoing to delay and disturb the various services of the Cloud Computing. In this paper, we propose the Hornet-Cloud using security Honeypot technique and resources of Cloud Computing, and design the concept of active-interaction and security functions of Hornet-Cloud simply.

Design and Implementation of Multi Messaging System Using SK-VM Based On J2ME (J2ME기반의 SK-VM을 이용한 다중 메시징 시스템 설계 및 구현)

  • 김응곤;최완규;이성주
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2001.12a
    • /
    • pp.41-45
    • /
    • 2001
  • In the case of mobile internet service using WAP, It was connected to http protocol using WAP Gateway. So, Users take increased cost of mobile internet service. and it was generated inner security problem because it watched user information in the WAP Gateway. To solve this problem we use java language. Which is independant of platform and low cost and intensely security and downloadable application. Additional, Using socket connection, Multi Messaging System(MMS) will connect real time between PC-Client and Mobile-Client, Mobile-Client and Mobile-Client, and so on. In this paper, as design and implementation o( multi messaging used SK-VM based on .12ME, It will be foundation to develop various mobile application in the future.

  • PDF

A Study on the Simulation analysis and design concept of Exterior Lighting at the OOAgricultural& fishery Circulation Center (OO농수산물유통센타 경관조명 설계안 및 Simulation 분석 평가)

  • 차광석;신일섭
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2001.11a
    • /
    • pp.31-34
    • /
    • 2001
  • Changing to a 24-hour urbanistic life style, a night time activities constituted for a major portion. Important of a beautiful exterior lighting as well as safety, and security concerns become increasingly. However, the removal or control of the excessive lighting is considered more important then increasing the brightness of the lamps to achieve bother safety and security. Representing a cheerful and leisure environment from the exterior lighting can also harmonize two aspects of energy saving and sustaining green environment. Designing of exterior lighting at the OO Agricultural & Fishery Circulation center symbolizes the suitability, convenience and production. It's design and analysis represent the optimum urban night time environment.

  • PDF

A Design and Implement of IPSec-based iSCSI Storage system in wireless computing environment (무선 컴퓨팅 환경에서의 IPSec 기반 iSCSI 스토리지 시스템의 설계 및 구현)

  • Chung, Ho-Won;Kim, Dae-Sung;Oh, Sei-Woong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.302-307
    • /
    • 2004
  • It need remote storage system using iSCSI to overcome a limit of PDA storage device used in currently wireless network environment, and IPSec to solve a security problem of wireless environment increasing continually. In this paper, it design and implement iSCSI to use a remote storage system on PDA, and IPSec for security. The experimental results in real environment show a system performance.

  • PDF

Design of Hiding Secret Information System on Home Network Devices (홈 디바이스 기밀정보 은폐시스템 설계)

  • Kim, Do-Woo;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.841-844
    • /
    • 2007
  • Security services required by a home network depend on the definition of a home. That depends on which of home network technologies is included. Various devices in home network environments connected with access network. These home devices can be attacked. So essential parts is needed to protect secret information stored in home network devices. In this paper we design the system that protects secret information in home network devices to offer secure home network services.

  • PDF

Design of Security Attributes in Step of S/W Design (S/W 설계 단계에서 보안 속성 설계)

  • Shin, Seong-Yoon;Shin, Kwang-Seong;Lee, Hyun-Chang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.01a
    • /
    • pp.83-84
    • /
    • 2015
  • 본 논문에서는 모든 독립된 업무 시스템에 대해서 보호 대상을 개별적으로 식별해야 한다는 것을 제시한다. 모든 단위 업무 시스템은 노드, 모듈, 인터페이스를 설계하면서 보호대상을 정의해야 한다. 이에 따라서 개별 업무 시스템별로 보호 대상 정의 테이블에서 식별된 보호 대상 노드, 모듈은 분석 단계에서 정의된 보안 기준에 따라 보안 속성을 설계해야 한다는 것이다.

  • PDF

A Design and Implementation of Detection System against Evasional Attack to IDS (IDS 우회공격 탐지 시스템 설계 및 구현)

  • Gil, Min-Wook;Cha, Jun-Nam;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.165-177
    • /
    • 2002
  • IDS(Intrusion Detection System) evasion is a technology which uses vulnerability of IDS in order not to be detected by IDS. In this paper, at first, we classify IDS evasion technology. Second, we propose detection model of IDS evasion technology. Finally, we design and implement detection system of IDS evasion.

  • PDF