• Title/Summary/Keyword: Web 보안

Search Result 766, Processing Time 0.03 seconds

A study on Seamless Security Connection of Web Services for Mobile Environment (모바일 환경을 위한 웹 서비스의 무단절 보안 연결에 관한 연구)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.41-49
    • /
    • 2008
  • Other server based-application and the need of more complex interaction is required with functional strengthening and variational uses of mobile device. And mobile environments make a problem of continuous of web-service by making a problem of instance cutting between web-server and mobile device which acts as a client because of mobility. Therefore, this paper embodies a framework which keeps security and connectivity between HTTP based web-service and mobile device, and is for connection to web-service of mobile device which uses WAP in a standard protocol based mobile environment of mobile web-service for continuous web-service. This paper is analyzed in the same standard condition to compared functional delay which is based on HTTP and WAP access, and data transmission volume. Also it investigates improvement of execution overhead which is brought by interaction process.

  • PDF

A Study of Web Application Security Quality Architecture Management Process referenced ISO/IEC9000 Model (ISO/IEC9000모델을 참조한 웹 애플리케이션 보안품질 관리체계 설계)

  • Kim, Jeom-Goo;Noh, Si-Choon;Lee, Do-Hyeon
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.11-17
    • /
    • 2012
  • According to ISO/IEC 9000, quality to satisfy users' requirements when using the product or service is defined as the characteristics of the synthesized concept. Secure web application coding information systems with the reliability and quality of service is one of the determining factor. Secure coding in order to achieve the quality based on the model is necessary. The reason is that the security is in quality properties in the range of non-functional requirements that necessitates. Secure coding for the design of quality systems based on the quality of the definition of quality attributes, quality requirements, quality attribute scenarios are defined, and must be set. To this end, referring to IEEE 1061 quality model for web application, quality model structure is developed. Secure web application architecture design is composed of coding quality of the model systems, web applications draw interest to stakeholders, decision drivers secure coding architecture, quality attributes, eliciting quality requirements of the security settings, creating web application architecture descriptions and security framework.

A Study on Integration of Web Service considering Message Security and CBD for e-business environment (e-비지니스 환경에서 메시지 보안을 고려한 웹 서비스와 CBD 통합에 관한 연구)

  • Ha, Yan
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2009.01a
    • /
    • pp.361-364
    • /
    • 2009
  • 본 연구는 메시지 보안을 고려한 웹 서비스와 컴포넌트 개발 방법론의 통합에 관한 것으로, 컴포넌트 저장소에 있는 컴포넌트들을 검색하여 동적으로 웹 서비스를 제공하는 시스템을 기반으로 안전한 웹 위해 메시지 보안 요소를 지원하기 위한 것이다. 이질적인 컴포넌트들로부터 통합된 프레임워크를 제공하고, 이들로부터 동적으로 웹 서비스를 생성하는 과정에서 웹 서비스의 보안을 개선시키고자 한다. 이를 위해 XML 기반 보안 및 전자서명 인증 기술의 포함으로 메시지 내용의 무결성과 기밀성을 보장하는 것을 목표로 한다.

  • PDF

Web Monitoring based Encryption Web Traffic Attack Detection System (웹 모니터링 기반 암호화 웹트래픽 공격 탐지 시스템)

  • Lee, Seokwoo;Park, Soonmo;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.449-455
    • /
    • 2021
  • This paper proposes an encryption web transaction attack detection system based on the existing web application monitoring system. Although there was difficulty in detecting attacks on the encrypted web traffic because the existing web traffic security systems detect and defend attacks based on encrypted packets in the network area of the encryption section between the client and server, by utilizing the technology of the web application monitoring system, it is possible to detect various intelligent cyber-attacks based on information that is already decrypted in the memory of the web application server. In addition, since user identification is possible through the application session ID, statistical detection of attacks such as IP tampering attacks, mass web transaction call users, and DDoS attacks are also possible. Thus, it can be considered that it is possible to respond to various intelligent cyber attacks hidden in the encrypted traffic by collecting and detecting information in the non-encrypted section of the encrypted web traffic.

An Anonymiser Development for Web Security (Web security 기능을 위한 Anonymiser 구축 방안에 대한 연구)

  • Choi, Young-Lim;Jang, Hyuk-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1057-1060
    • /
    • 2001
  • Web Security를 위한 방법으로서 anonymity에 대한 개념에 대해서 살펴보고, 멀티캐스트 그룹환경에서 web 보안을 위해 익명 서비스를 제공하는 anonymiser 를 사용하여 보다 효율적인 web 보안과 익명 서비스를 적용할 수 있는 방안을 제안 한다.

  • PDF

The Identity Web : Trend and Security Requirement (The Identity Web : 동향 및 보안 요구사항)

  • Cho, Sang-Rae;Jin, Seung-Hun
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.163-164
    • /
    • 2006
  • 실생활에서 나타나는 Social Network 을 웹에서 실현하기 위해서 Social Web 이 등장하고 그 전 단계로 Identity Web 이 현재 연구되고 있다. 그리고 웹의 확장으로 도메인간의 자유로운 데이터를 공유하기 위해서는 XML, XRI, XDI 가 제공되고 있다.. 본 논문은 Identity Web 을 실현하기 위한 기반 기술에 대하여 조사한 내용을 기술하고 이러한 인프라에서 자유로운 데이터의 공유를 하기 위해서는 어떠한 보안 요구사항들이 필요한지 고려하여 본다.

  • PDF

A Study on the Fingerprint Authentication Module for Web Services (웹서비스를 위한 지문인증 모듈에 관한 연구)

  • Oh, Yoon-Tak
    • Journal of the Korea Computer Industry Society
    • /
    • v.8 no.4
    • /
    • pp.253-262
    • /
    • 2007
  • As the internet environment is applied in the various service field, the recognition on security is increasing. Because the authentication methods for web service user do not confirm person oneself, the serious problems of reliability, safety and security can be caused. In order to solve this problems, the authentication methods of user id and password or authentication key is used. Because the password and authentication key using the existent authentication methods for security is composed of a string, authentication information can easily hacked or leaked by hackers, and the serious problems of security can be caused. In this paper, in order to improve the web security, an authentication module using the fingerprint that have the unique properties of person is proposed. As the proposed module makes use of fingerprint authentication, the security of the web service user from hackers can be maintained. The proposed method is more excellent than the existent method in the web security.

  • PDF

안전한 웹 서비스를 위한 SOAP 메시지 보안기술 연구

  • 박배효;이재일
    • Review of KIISC
    • /
    • v.14 no.4
    • /
    • pp.10-18
    • /
    • 2004
  • 상호운영성, 유연성, P2P(피어투피어), 역동성, 확장성 등 웹 서비스가 지닌 다양한 특성으로 인하여 웹 서비스 보안은 안전한 웹 서비스 운영을 위한 핵심요소라 할 수 있다. 웹 서비스의 기본 구성은 서비스 수요자와 제공자, 검색소로 구성되며 WSDL(Web Service Definition Language), UDDI(University Discovery and Integration of Business for Web), SOAP(Smple Object Access Protocol)등 세 개의 표준으로 서비스는 이루어진다. 이 중에서 특히 메시지 교환을 담당하는 통신 프로토콜인 SOAP는 웹 서비스 보안의 중심에 있으며, 웹 서비스 보안은 SOAP 메시지의 사용자 인증과 무결성, 기밀성을 보장하는 것으로 정의할 수 있다. SOAP는 HTTP를 통해 일반적으로 전송되므로 HTTP 상의 모든 위협을 가지게 되며 전송계층에 기반을 둔 보안을 생각할 수 있지만, 사실상 웹 서비스는 다수의 중간 중개자를 가질 수 있는 구조이기 때문에 단대단 보안(메시지 레벨의 보안)이 반드시 필요하다. 또한, 웹 서비스 상에서 단대단 보안을 보장하기 위해서는 각 객체와 키와의 연결이 중요하며 특정 객체에게 발행한 보안토큰의 신뢰성 화보를 위한 메카니즘을 필요로 한다. 본 논문에서는 이러한 보안 요구사항을 만족하기 위하여 XML 메시지 보안을 위한 전자서명 및 암호화 표준과 SOAP을 위한 W3C, OASIS의 통합표준을 중심으로 SOAP 메시지 보안기술을 분석하고자 한다.

Design and Implementation of a Web Security System using a Chaos Cipher Algorithm (카오스 암호화 알고리즘을 이용한 웹 보안 시스템 설계 및 구현)

  • Lee, Bong-Hwan;Kim, Cheol-Min;Yun, Dong-Won;Chae, Yong-Ung;Kim, Hyeon-Gon
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.585-596
    • /
    • 2001
  • In this paper, a new stream cipher algorithm based on the chaos theory is proposed and is applied to a Web security system. The Web security system is composed of three parts: certificate authority (CA), Web client, and Web server. The Web client and server system include a secure proxy client (SPC) and a secure management server (SMS), respectively, for data encryption and decryption between them. The certificate is implemented based on X.509 and the RSA public key algorithm is utilized for key creation and distribution to certify both the client and server. Once a connection is established between the client and server, outgoing and incoming data are encrypted and decrypted, respectively, using one of the three cipher algorithms: chaos, SEED, and DES. The proposed chaos algorithm outperforms the other two conventional algorithms in processing time and complexity. Thus, the developed Web security system can be widely used in electronic commerce (EC) and Internet banking.

  • PDF

A Study of Web Application Development Method for Secure Coding Approach Based on SDLC Steps (SDLC 설계절차에 기반한 웹 애플리케이션 시큐어코딩 접근방법 연구)

  • Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.93-99
    • /
    • 2012
  • As the most common application development of software development time, error-free quality, adaptability to frequent maintenance, such as the need for large and complex software challenges have been raised. When developing web applications to respond to software reusability, reliability, scalability, simplicity, these quality issues do not take into account such aspects traditionally. In this situation, the traditional development methodology to solve the same quality because it has limited development of new methodologies is needed. Quality of applications the application logic, data, and architecture in the entire area as a separate methodology can achieve your goals if you do not respond. In this study secure coding, the big issue, web application factors to deal with security vulnerabilities, web application architecture, design procedure is proposed. This proposal is based on a series of ISO/IEC9000, a web application architecture design process.