• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.029 seconds

An Efficient Access Control Mechanism for Secure Surveillance Systems (안전한 보안 감시 시스템을 위한 효율적인 접근 제어 기법)

  • Yang, Soomi;Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.228-233
    • /
    • 2014
  • In recent general social surveillance systems, secure access control mechanism is needed. ONVIF establishes standards for interoperability between cameras and defines web service framework for it. In this paper we present an efficient attribute based access control mechanism for surveillance system networks which follow the ONVIF standards. It accommodates web service information security techniques and provides efficient secure access control.

Network Group Access Control system using piggy-backing prevention technique based on Infrared-Ray (적외선 기반 피기백킹 방지 기법을 적용한 네트워크 그룹 접근통제 시스템)

  • Kim, JongMin;Choi, KyongHo;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.109-114
    • /
    • 2012
  • Information society in recent times, lots of important information have been stored in information systems. In this situation, unauthorized person can obtains important information by piggy-backing and shoulder surfing in specific area of organization. Therefore, in this study, we proposed network group access control system by combining RFID and infrared-ray for blocking information leakage due to unauthorized access by internal threats and enhancing personnel security. So it can provides a more secure internal network environment.

A Study for PKI Based Home Network System Authentication and Access Control Protocol (PKI 기반 홈 네트워크 시스템 인증 및 접근제어 프로토콜에 관한 연구)

  • Lee, Young-Gu;Kim, Jung-Jae;Kim, Hyun-Chul;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.592-598
    • /
    • 2010
  • A home network system is made up of subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. So, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this paper designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.

The Study on YARA Rules and Detection Tool for HWP Document-Type Malware (HWP 문서형 악성코드 탐지를 위한 YARA규칙 및 탐지도구에 관한 연구)

  • Joongjin Kook;Heechan Won;Sungwoo Kim;Dohee Kim;Junghoon Lee
    • Journal of the Semiconductor & Display Technology
    • /
    • v.23 no.3
    • /
    • pp.108-114
    • /
    • 2024
  • This study details the development of YARA rules and a detection program specifically designed to identify malware in HWP documents, a common target in cyber-attacks within South Korea. By thoroughly analyzing the unique structural features of HWP files, we developed precise YARA rules that were subsequently integrated into a custom detection tool. The program was rigorously tested on a dataset of benign and malicious HWP documents, demonstrating high detection accuracy and a low false-positive rate. This research offers a robust and practical solution for enhancing cybersecurity in environments where HWP files are frequently used, contributing valuable tools for the targeted detection of document-based malware.

  • PDF

Practical one-time password system using the self-certified identity information (자체인증 개인식별정보를 이용한 실용적인 일회용 패스워드 시스템)

  • 박성준;성맹희
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1996.11a
    • /
    • pp.226-232
    • /
    • 1996
  • 본 논문에서는 기존의 일회용 비밀번호 시스템의 사용 횟수의 제한 문제를 "서명 고리" 개념을 사용하여 해결한 횟수 제한이 없는 일회용 비밀번호 시스템을 제안한다 제안하는 방식은, 역설적인 개인식별정보 방식인, 자체인증 개인식별정보에 기반을 둔 서명방식을 사용하였으며, 홈 뱅킹에 적합한 실용적인 일회용 비밀번호 시스템이다.밀번호 시스템이다.

  • PDF

A Study on the Conference Key Distribution System based on ID-information (ID 정보에 의한 회의용 암호키 분배방식)

  • 손기욱;이경호;권창영;이인숙;원동호
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1991.11a
    • /
    • pp.261-269
    • /
    • 1991
  • 암호 방식의 보안성은 암호키 보안에 커다란 영향을 받고 있어 암호 통신망 가입자가 상호간에 공유해야 하는 통신키 분배 문제가 암호학의 중요한 연구 분야가 되고 있다. 통신키를 분배 하는 방식은 크게 중앙 집중식 키 분배 방식과 공개키 분배 방식, 그리고 ID 정보에 의한 분배 방식으로 나눌 수 있다. 본 논문에서는 다자간 회의용 암호 통신키 분배 방식으로 사용할 수 있는 새로운 ID 정보에 의한 키 분배 방식을 제안하였다.

  • PDF

정보보호시스템 평가기준 보안기능 요구사항 분석

  • 조규민;황영석;이경구
    • Review of KIISC
    • /
    • v.10 no.3
    • /
    • pp.1-12
    • /
    • 2000
  • 정보보호시스템을 평가하기 위한 기준은 보안기능 요구사항 및 보증요구 사항으로 이루어진다 본고에서는 미국의 TCSEC(Trusted Computer System Evaluation Criteria)과 유럽의 ITSEC(Information Technology Security Evaluation Criteria) 국제표준 (SIO/IEC 15408) 으로 제정된 CC(Common Criteria for Information Technology Secuirty Evaluation)의 보안 기능 요구사항을 비교, 분석하고 국내에서 개발된 침입차단시스템과 침입탐지시스템 평가기준, 현재개발중인 사용자인증용 스마트카드 평가기준의 보안기능 요구사항을 소개한다.

  • PDF

A Study on the Electronic Clearance System of the Advanced Countries and Korea (선진국과 한국의 전자통관제도에 관한 연구)

  • Eom, Kwang-Yeol;Song, Seon-Uk
    • International Commerce and Information Review
    • /
    • v.5 no.2
    • /
    • pp.185-204
    • /
    • 2003
  • Electronic Clearance System in the Advanced Countries give sane hints Clearance System in Korea to improve. It is as follows. It is necessary to enhance the economical efficiency and rapidity on clearance system. It is important to improve the conveniency of importer and export through all day services in customs. It is necessary to control export and import goods efficiently for guarantee of security. Export entry data in export country has to linked with import entry data in import country to improve speedy, correctness, and efficiency. It is necessary to solve the security problems through the use of the latest cryptograph.

  • PDF

DoS Attack Control Design of IoT System for 5G Era

  • Rim, Kwangcheol;Lim, Dongho
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.2
    • /
    • pp.93-98
    • /
    • 2018
  • The Internet of Things (IoT) is a form of the emerging 4th industry in the 5G era. IoT is expected to develop naturally in our daily life in the 5G era in which high-speed communication will be completed. Along with the rise of IoT, concerns about security and malicious attacks are also increasing. This paper examines DoS attacks, which are one of the representative security threats of IoT and proposes a local detection and blocking system that are suitable for response to such attacks. First, systems of the LoRaWAN type, which are most actively researched in the IoT system field and DoS attacks that can occur in such systems were examined. Then, the inverse order tree algorithm using regional characteristics was designed as a cluster analysis form. Finally, a system capable of defending denial-of-service attacks in the 5G IoT system using local detection and blocking with the Euclidean distance was designed.

Defense Mechanism against Replay Attack on Remote Keyless Entry System (원격 키리스 엔트리시스템에 대한 재생공격 무력화 기법)

  • Kim, Young Min;Kim, Seong Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.247-250
    • /
    • 2019
  • The first-generation RKE(Remote Keyless Entry) system is very vulnerable to replay attacks and the encryption of the second-generation RKE system is known to be disabled by four to eight signal receptions and analysis. In order to enhance the security of the RKE system, we introduce a physical-layer security methods in the RKE system and propose a technique to disable the replay attack by reducing the quality of the signal received by an eavesdropper.

  • PDF