• Title/Summary/Keyword: Web 보안

Search Result 763, Processing Time 0.033 seconds

Optimized Web Design Method by Analyzing the Websites (웹사이트 분석을 통한 최적화 설계 방안)

  • Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.19-24
    • /
    • 2015
  • As the Internet usage such as Web3.0, future internet, and internet of things increases, the big data through information exchange between the users and web servers increases. Analyzing those web data, the commercial web sites use the analytic results for marketing and campaign, and non-commercial web sites also use the results to improve the user's services satisfaction. In this paper, the quantitative index is presented to analyze the web sites, and optimized web site design method is also presented through the correlation analysis of index and significance test. From the results for 138 web sites, it is observed that strong plus(+) correlation for visits-unique visitors and page views-average visit duration exists. We also observe the minus(-) correlation between bounce rate and page views per user(or ratio of new visits). In specific, to reduce the bounce rate for users, the strategy to increase the page views and ratio of new visits rather than visits and unique visitors is needed.

Propose a Static Web Standard Check Model

  • Hee-Yeon Won;Jae-Woong Kim;Young-Suk Chung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.4
    • /
    • pp.83-89
    • /
    • 2024
  • After the end of the service of Internet Explorer, the use of ActiveX ended, and the Non-ActiveX policy spread. HTML5 is used as a standard protocol for web pages established based on the Non-ActiveX policy. HTML5, developed in the W3C(World Wide Web Consortium), provides a better web application experience through API, with various elements and properties added to the browser without plug-in. However, new security vulnerabilities have been discovered from newly added technologies, and these vulnerabilities have widened the scope of attacks. There is a lack of research to find possible security vulnerabilities in HTML5-applied websites. This paper proposes a model for detecting tags and attributes with web vulnerabilities by detecting and analyzing security vulnerabilities in web pages of public institutions where plug-ins have been removed within the last five years. If the proposed model is applied to the web page, it can analyze the compliance and vulnerabilities of the web page to date even after the plug-in is removed, providing reliable web services. And it is expected to help prevent financial and physical problems caused by hacking damage.

Architecture Modeling for Kiosk-based Public Services through Web (키오스크 기반 웹 민원처리시스템 구축을 위한 아키텍쳐 모델링)

  • 안임상;정기원
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.1
    • /
    • pp.285-301
    • /
    • 2004
  • Public service provision through internet is one of major parts for e-government implementation. It is essential to link the internal administrative network with internet to provide the services through internet and to support kiosks through internet, which should result in critical issues for security. A relay server, as a front server for the public service processing system and a web server, a control server for kiosks, are placed between the public service processing system and kiosks to solve those security issues. It is the way to solve security issues through protecting direct communication between the public service processing system and a web server and authenticating a relay server and a web server through authentication process. In the implementation of the system this paper provide a design for an architecture model of the public service processing system through internet, which are aiming to develop high level of the quality system effectively, to reduce the risk of initial stage of development, and to reduce the incurring cost due to reworks.

  • PDF

Web Application Security using Distributed Encipherment (분산 암호화를 이용한 웹 어플리케이션 보안)

  • Heo, Jin-Kyoung
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.4
    • /
    • pp.10-16
    • /
    • 2008
  • Quantity of encrypted data that transmitted through the network are increasing by development of encipherment technology. We have many problems; it is caused by technical development and service increase of user requests. It is necessary that create a many encryption key in one web application system. As a result, service quality comes to be low because of increased network traffic and system overload. There must be a system. That should be improved in secure service quality to process data. This paper describes a new approach for design and implementation of distributed encryption key processing for web application system. In this paper, it is based on distributed encipherment key, for the purpose of confidentially, integrity and authentication. It can prevent system degradation from server's data bottleneck and can improve service quality. For distributed encipherment system, we use java object activation technology. It can service while some distributed server are fail.

Standardization and Market Trends of Web Services Security Technologies (웹서비스 보안 기술의 표준화 및 시장 동향)

  • Kim, J.H.;Kim, S.H.;Park, N.J.;Lee, J.Y.;Lee, J.S.;Moon, K.Y.;Jang, J.S.;Sohn, S.W.
    • Electronics and Telecommunications Trends
    • /
    • v.20 no.1 s.91
    • /
    • pp.43-53
    • /
    • 2005
  • 웹서비스 보안기술은 웹서비스 기술 표준을 적용하여 다수의 응용들 간의 안전한 문서 전송, 인터넷 자원의 접근제어와 인가, 합법적 사용자 확인을 위한 인증 서비스 등을 제공하는 표준 보안 기술이다. 웹서비스 보안기술은 기술 특성에 따라 XML 정보보호 기술, 웹서비스 보안 프레임워크 기술, 웹서비스 응용보안 기술로 구분된다. XML 정보보호 기술은 XML 기반 서비스나 시스템을 위한 보안 기반 기술로인증, 인가, 기밀성, 무결성, 부인봉쇄 등의 보안서비스 및 보안정보 관리 기능을 제공하며, 세부기술로는 XML 전자서명 및 암호화 기술, XML 기반 보안정보 교환기술, XML 기반 접근제어기술, XML 기반 공개키 관리기술 등이 있다. 본 고에서는 현재 표준화가 되었거나 진행중인 XML 정보보호 기술과 웹서비스 보안 프레임워크 기술에 대한 개요, 시장 동향 및 표준화 동향 등을 소개한다.

An Efficient Access Control Mechanism for Secure Surveillance Systems (안전한 보안 감시 시스템을 위한 효율적인 접근 제어 기법)

  • Yang, Soomi;Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.228-233
    • /
    • 2014
  • In recent general social surveillance systems, secure access control mechanism is needed. ONVIF establishes standards for interoperability between cameras and defines web service framework for it. In this paper we present an efficient attribute based access control mechanism for surveillance system networks which follow the ONVIF standards. It accommodates web service information security techniques and provides efficient secure access control.

Design and Implementation of Security Frame work for Application Server with Components

  • 김행곤;강전근
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.4
    • /
    • pp.531-540
    • /
    • 2004
  • Development of Web service application requires the interoperability between various heterogeneous systems, extensibility to allow modification of business environment not of user interface, maintainability, flexibility and reusability As the properties of CBD (Component Based Development) have gradually become clear, attention has started to turn the smooth technology and methodology to solve the existing problems and issues the dynamic responds for the distributed web environments. In this paper, we identify some of the major architectural affecting CBD and describe the Design and Implementation of Security Framework for Application Server with Components. We identify the candidate components, model it using UML and layer it on the architecture. The frameworks will Provide the various security functions, such as incorporating with legacy security systems, supporting of J2EE, JAAS and Kerberos and assisting in increasing the tailorability of component.

  • PDF

The Soft Security Improvement of HTML5 With WEB Application (HTML5 로 구현한 웹 어플리케이션 보안 취약성 개선)

  • Kim, Kwang Su;Jang, Young Su;Choi, Jin Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.514-517
    • /
    • 2014
  • HTML5 는 웹 문서를 작성하기 위한 HTML(Hyper Text Markup Language)의 차세대 웹 표준 이다. HTML5 는 아직 개발 중에 있으며 2014 년 하반기에 최종표준이 발표 될 것으로 전망 된다. HTML5 는 이전 버전의 HTML 과 호환성을 유지하면서 개발자에게 동영상, 위치정보, 소켓통신 및 다양한 미디어 서비스 을 별도의 플러그인 없이 HTML5 의 확장된 표준 태그로 Dynamic 한 기능을 구현할 수 있게 한다. 그러나 HTML5 에 새롭게 추가된 일부 표준 태그 에서 웹 어플리케이션(Web application) 서비스의 데이터 보안 취약점이 발견되었다. 본 논문에서는 HTML5 로 웹 어플리케이션 소프트웨어 개발 과정에서 발견된 표준 태그 및 API 보안 취약점을 분석하고 공격대상이 되는 소스코드 의 취약점을 개선 하였다. 보안에 취약한 소스코드 취약점을 개선하여 외부 공격자의 위협으로 부터 보안 취약점을 예방 할 수 있는 대응방법을 제안한다.

Measurement of Remediation for Compromised User Account of Web Single Sign-On (SSO) (침해된 웹 SSO 계정 보호를 위한 보안 조치 실험 연구)

  • Nam, Ji-Hyun;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.941-950
    • /
    • 2021
  • Single Sign-On (SSO) service manages user's account passwords from multiple websites so that security in a high level is required. Users who use the SSO service are authenticated through the Identity Provider (IdP) when logging into the website. We present the security requirements that IdP can take in order to minimize the user's risk whose IdP account is compromised. We describe the security threats that arise when the security requirements are not satisfied. Through evaluation, we prove that the attacker's session cannot be canceled even if the user recognizes the attack if the IdP does not satisfy the security requirements.

Secure Web Mail System Development Using The Chaos Encryption Method (카오스 암호 기법을 이용한 보안 웹 메일 시스템 설계 및 구현)

  • Jung, Sung-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05b
    • /
    • pp.755-758
    • /
    • 2003
  • 본 연구에서는 카오스 이론을 바탕으로 개발된 카오스 암호 기법을 이용하여 보안 웹 메일 시스템을 개발하였다. 본 연구를 통해 개발된 보안 웹 메일 시스템은 기존의 키 수열 생성 방법과 글리 비선형성이 보장된 카오스 키 수열 생성을 통해 암복호 알고리즘을 구현하고 이를 웹 메일 시스템에 적용하였다. 개발된 시스템은 균형성과 랜덤특성이 기존의 카오스 키 수열을 사용하고 있으므로 카오스적 특징에 의해 비교적 안전한 보안 기능을 제공하고 있다.

  • PDF