• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.03 seconds

An Implementation and Performance Evaluation of IPsec System engaged IKEv2 Protocol Engine (IPsec System에서 IKEv2 프로토콜 엔진의 구현 및 성능 평가)

  • Kim, Sung-Chan;Chun, Jun-Ho;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.35-46
    • /
    • 2006
  • The current Internet Key Exchange protocol(IKE) which has been used for key exchange of security system was pointed out the faults of scalability, speed, efficiency and stability. In this research, we tried to resolve those faults, and implemented the newly designed IKEv2 protocol in the IPsec test bed system. In the trend of network expansion, the current Internet Key Exchange protocol has a limitation of network scalability, so we implemented the new Internet Key Exchange protocol as a recommendation of RFC proposal, so as to resolve the fault of the key exchange complexity and the speed of authentication process. We improved the key exchange speed as a result of simplification of complex key exchange phase, and increased efficiency with using the preexistence state value in negotiation phase.

Technique and Implementation of Secure Downloadable Conditional Access System (안전한 다운로드 가능 제한 수신 시스템 제안 및 구현)

  • Kang, Seong-Ku;Park, Jong-Youl;Paik, Eui-Hyun;Park, Choon-Sik;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.161-174
    • /
    • 2009
  • IPTV provides their services only for their subscribers who have a eligibility to watch it by using Conditional Access System(CAS). CAS has been servicing their contents for subscribers by using set-top box or cable card so far, but these days, to solve the compatibility between kinds of devices, linkage with other services as DRM and confirming stability, the research of Downloadable CAS(DCAS) is being advanced steadily. On this paper, we analyse the vulnerability of DCAS based on the OpenCable and make up for the vulnerability in DCAS, then proposes to use secure DCAS system for IPTV. Also we show the result of the research and analyse the satisfaction of requirements.

Long-Term Container Allocation via Optimized Task Scheduling Through Deep Learning (OTS-DL) And High-Level Security

  • Muthakshi S;Mahesh K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.4
    • /
    • pp.1258-1275
    • /
    • 2023
  • Cloud computing is a new technology that has adapted to the traditional way of service providing. Service providers are responsible for managing the allocation of resources. Selecting suitable containers and bandwidth for job scheduling has been a challenging task for the service providers. There are several existing systems that have introduced many algorithms for resource allocation. To overcome these challenges, the proposed system introduces an Optimized Task Scheduling Algorithm with Deep Learning (OTS-DL). When a job is assigned to a Cloud Service Provider (CSP), the containers are allocated automatically. The article segregates the containers as' Long-Term Container (LTC)' and 'Short-Term Container (STC)' for resource allocation. The system leverages an 'Optimized Task Scheduling Algorithm' to maximize the resource utilisation that initially inquires for micro-task and macro-task dependencies. The bottleneck task is chosen and acted upon accordingly. Further, the system initializes a 'Deep Learning' (DL) for implementing all the progressive steps of job scheduling in the cloud. Further, to overcome container attacks and errors, the system formulates a Container Convergence (Fault Tolerance) theory with high-level security. The results demonstrate that the used optimization algorithm is more effective for implementing a complete resource allocation and solving the large-scale optimization problem of resource allocation and security issues.

Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector

  • Shim, Min-A;Baek, Seung-Jo;Park, Tae-Hyoung;Seol, Jeong-Seon;Lim, Jong-In
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.5
    • /
    • pp.548-574
    • /
    • 2009
  • Personal information (hereinafter referred to as "PI") infringement has recently emerged as a serious social problem in Korea. PI infringement in the public and private sector is common. There were 182,666 cases of PI in 2,624 public organizations during the last three years. Online infringement cases have increased. PI leakage causes moral and economic damage and is an impediment to public confidence in public organizations seeking to manage e-government and maintain open and aboveboard administration. Thus, it is an important matter. Most cases of PI leakage result from unsatisfactory management of security, errors in home page design and insufficient system protection management. Protection management, such as encryption or management of access logs should be reinforced urgently. However, it is difficult to comprehend the scope of practical technology management satisfied legislation and regulations. Substantial protective countermeasures, such as access control, certification, log management and encryption need to be established. It is hard to deal with the massive leakage of PI and its security management. Therefore, in this study, we analyzed the conditions for the technical protection measures during the processing phase of PI. In addition, we classified the standard control items of protective measures suited to public circumstances. Therefore, this study provides a standard and checklist by which staff in public organizations can protect PI via technical management activities appropriate to laws and ordinances. In addition, this can lead to more detailed and clearer instructions on how to carry out technical protection measures and to evaluate the current status.

Military Entrance Control System Using Military Insignia UHF RFID Tags (군 계급장 UHF RFID 태그를 이용한 군 보안출입관리 시스템)

  • Nam, Seahyeon;Chung, You Chung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.966-971
    • /
    • 2013
  • This paper introduces development of a Military Entrance Control System using the developed military insignia UHF RFID tags. Generally, in the military entrance control system, the security identification (ID) card with HF RFID tag can be used, to increase the security level, the developed insignia UHF RFID tags are used in the enforced military entrance control system. The general metal insignias, have been worn on a hat or on the shoulder pads of a military uniforms, are simulated and developed as UHF RFID insignia tags. The military entrance control system can manage the name, rank, address (information of military personnel), time and date of entrance and the history of entrance of the security area.

Electronic Signature Model and Application of Security Server System using Identity Information (식별정보를 이용한 보안서버시스템의 전자서명 모델 및 응용)

  • Kim Young-Soo;Shin Seung-Jung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.169-174
    • /
    • 2005
  • Electronic signature system is required to be used in the promotion of the e-Commerce. Because the application system for electronic signature system has inconvenience and vulnerability of security, users are reluctant to use it. Therefore, the electronic signature system should give a guarantee of convenience and security. In this paper, we propose server-based application model, which uses identity information and makes users access transparently to solve electronic signature problems. We also design and verify electronic signature system that reduces threats to security, which cause server attack by distributing the part of signature key to both server and client. The application model with lightweight server system based on the electronic signature system is expected to be used in the promotion of the e-Commerce and help to make its business more efficient and competitive.

A Secure RFID Search Protocol Protecting Mobile Reader's Privacy Without On-line Server (온라인 서버가 없는 환경에서 이동형 리더의 프라이버시를 보호하는 안전한 RFID 검색 프로토콜)

  • Lim, Ji-Wwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.73-90
    • /
    • 2010
  • Recently, Tan et al. introduced a serverless search protocol in which a mobile reader maintains a tag authentication list and authenticates a tag using the list without connecting authentication server. A serverless RFID system is different from general RFID systems which use on-line server models. In the serverless RFID system, since the mobility of a personalized reader must be considered, we have to protect not only the privacy of a tag but also the privacy of a mobile reader. In this paper, we define new security requirements for serverless RFID search system and propose a secure serverless RFID search system. In our system, since tag authentication information maintained by a reader is updated in every session, we can provide the backward untraceability of a mobile reader. Also we use an encrypted timestamp to block a replay attack which is major weakness of search protocols. In addition, we define a new adversary model to analyze a serverless RFID search system and prove the security of our proposed system using the model.

A Research for New Taxonomy of Information Visualization (정보시각화의 새로운 분류법에 관한 연구)

  • Bae, Jun-Woo;Lee, Suk-Won;Kim, In-Soo;Myung, Ro-Hae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.32 no.2
    • /
    • pp.76-84
    • /
    • 2009
  • Since too much information has been generated, it became very difficult to find out valuable and necessary information. In order to deal with the problem of information overload, the taxonomy for information visualization techniques has been based upon visualized shapes such as tree map, fisheye view and parallel coordinates, so that it was difficult to choose the right representation technique by data characteristics. Therefore, this study was designed to introduce a new taxonomy for the information visualization by data characteristics which defined by space (3D vs. multi-dimensions), time (continuous vs. discrete), and relations of data (qualitative vs. quantitative). To verify the new taxonomy, forensic data which were generated to investigate the culprit of network security was used. The result showed that the new taxonomy was found to be very efficient and effective to choose the right visualized shape for forensic data for network security. In conclusion, the new taxonomy was proven to be very helpful to choose the right information visualization technique by data characteristics.

Password Cracking of Live System (라이브 시스템의 패스워드 크래킹)

  • Lee, Seok-Hee;Kim, Kwon-Yeop;Lee, Sang-Jin;Lim, Jong-In
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2007.02a
    • /
    • pp.150-153
    • /
    • 2007
  • 본 논문에서는 라이브 시스템으로부터 패스워드를 획득하는 방법에 대해서 논하며, 이를 바탕으로 컴퓨터 관련범죄 발생 시 초기대응 과정 중에 사용할 수 있는 페이지파일 수집기를 구현하였다. 페이지파일 수집기를 이용하여 실 사용자들의 페이지파일을 수집하고 분석방법을 제시하였다. 또한 페이지파일로부터 어느 정도의 패스워드가 검출되는 가를 확인하였다. 이는 포렌식 수사에는 큰 도움을 줄 수 있지만, 포렌식 수사도구가 해킹을 위한 도구로 사용되었을 때에는 심각한 개인정보 유출을 야기할 수도 있다.

  • PDF

Mutual Authentication Protocol suitable to RFID System based on EPCglobal UHF Class-1 Generation-2 (EPCglobal UHF Class-1 Generation-2 기반 RFID 시스템에 적합한 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Choi, Eun-Young;Lee, Dong-Hoon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.129-132
    • /
    • 2008
  • 일정한 라디오 주파수 대역을 이용해 무선 방식으로 사물을 식별하는 RFID 시스템의 보안 및 프라이버시 보호를 위한 많은 기법들이 제안되었다. 하지만 제안된 기법들의 대부분은 국제 표준인 Class-1 Generation-2 태그에는 적합하지 않으며 안전성에서도 취약성이 있다. 최근에 Chien과 Chen은 Class-1 Generation-2 태그에 적합하면서도 안전성이 보장되는 상호 인증 프로토콜을 제안하였는데, 이 또한 취약성이 존재하며 데이터베이스에서의 태그를 찾기 위해 전수조사를 해야 하기 때문에 효율성이 떨어지는 문제점이 있다. 본 논문에서는 Chien과 Chen이 제안한 기법을 분석하고 안전성과 효율성을 향상시킨 새로운 상호 인증 기법을 제안한다.

  • PDF