• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.041 seconds

Game Theory-Based Vulnerability Quantification Method Using Attack Tree (Attack Tree를 활용한 Game Theory 기반 보안 취약점 정량화 기법)

  • Lee, Seokcheol;Lee, Sang-Ha;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.259-266
    • /
    • 2017
  • In modern society, IT technology based systems are introduced and operated in various fields such as home, industry, and finance. To ensure the safety of society, IT systems introduced throughout society should be protected from cyber attacks. Understanding and checking the current security status of the system is one of the important tasks to response effectively against cyber attacks. In this paper, we analyze limitations of Game Theory and Attack Tree methodologies used to inspect for security vulnerabilities. Based on this, we propose a security vulnerability quantification method that complements the limitations of both methodologies. This provides a more objective and systematic way to inspect for security weaknesses.

Design of the File Security Function Using Encryption Algorithm in the Windows Operating System (윈도우 운영체제에서 암호화 알고리즘을 이용한 파일 보안 기능 설계)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.612-618
    • /
    • 2013
  • The file security function, which this paper suggests, restricts the access of an unauthorized users by using password algorithm and saving file. Saved files that are encrypted are read by decrypting them with decryption algorithm. These features are user interface to design the program for user friendly. The security function implements both file encryption and decryption programs and tests whether the experiment works or not. In addition, when a decryption is progressed and the settings of between decryption and encryption are different each other, the security function also checks the possibility of decryption. We can enhance the security on important files stored in Windows servers or personal computers by developing this program.

A Design of Access Control Method for Security Enhance based Smart Device (스마트 디바이스 기반의 보안성 강화를 위한 접근제어 기법 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.11-20
    • /
    • 2018
  • Smart devices refer to various devices and control equipment such as health care devices, imaging devices, motor devices and wearable devices that use wireless network communication (e.g., Wi-fi, Bluetooth, LTE). Commercial services using such devices are found in a wide range of fields, including home networks, health care and medical services, entertainment and toys. Studies on smart devices have also been actively undertaken by academia and industry alike, as the penetration rate of smartphones grew and the technological progress made with the fourth industrial revolution bring about great convenience for users. While services offered through smart devices come with convenience, there is also various security threats that can lead to financial loss or even a loss of life in the case of terrorist attacks. As attacks that are committed through smart devices tend to pick up where attacks based on wireless internet left off, more research is needed on related security topics. As such, this paper seeks to design an access control method for reinforced security for smart devices. After registering and authenticating the smart device from the user's smart phone and service provider, a safe communication protocol is designed. Then to secure the integrity and confidentiality of the communication data, a management process such as for device renewal or cancellation is designed. Safety and security of the existing systems against attacks are also evaluated. In doing so, an improved efficiency by approximately 44% compared to the encryption processing speed of the existing system was verified.

A Study for the Designing and Efficiency Measuring Methods of Integrated Multi-level Network Security Domain Architecture (Multi-level 네트워크의 보안 도메인을 위한 통합 아키텍쳐 설계 및 효율성 측정방법 연구)

  • Na, Sang Yeob;Noh, Si Choon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.87-97
    • /
    • 2009
  • Internet network routing system is used to prevent spread and distribution of malicious data traffic. This study is based on analysis of diagnostic weakness structure in the network security domain. We propose an improved integrated multi-level protection domain for in the internal route of groupware. This paper's protection domain is designed to handle the malicious data traffic in the groupware and finally leads to lighten the load of data traffic and improve network security in the groupware. Infrastructure of protection domain is transformed into five-stage blocking domain from two or three-stage blocking. Filtering and protections are executed for the entire server at the gateway level and internet traffic route ensures differentiated protection by dividing into five-stage. Five-stage multi-level network security domain's malicious data traffic protection performance is better than former one. In this paper, we use a trust evaluation metric for measuring the security domain's performance and suggested algorithm.

Library Function Development for Internet MOSS(MIME Object Security Service) (인터네트 멀티미디어 전자우편의 보안 처리를 위한 라이브러리 함수 개발)

  • Yun, Seong-Sun;Yun, Gi-Song
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1493-1505
    • /
    • 1996
  • As Internet and its users grow dramatically multi-media data are getting common, many types of electronic mail applications are showing up. Internet s/w developers and users would like to electronic mail system for commercial purposes. They also would like to protect their electronic mail somehow. For these purpose, the security feature using cryptography is one of the essential functions. In this paper, we describe the library function development for handing MOSS(MIME Object Security Service), the security version of MINE(Multi -Purpose Internet Mail Extension). For these purpose, we explain the security features and structures of MOSS and defined the necessary function and we also discussed design issues for the MOSS implementation.

  • PDF

Improved Security Monitoring and Control Using Analysis of Cyber Attack in Small Businesses (중소기업 유해트래픽 분석을 통한 보안관제 개선 방안)

  • Hong, Jun Suk;Lim, Young Hwan;Park, Won Hyung;Kook, Kwang Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.4
    • /
    • pp.195-204
    • /
    • 2014
  • Recent, Secure the small and medium-sized enterprises from advanced and intelligence cyber threat, 24 hours of prevention, detection and analysis is essential. Small and Medium Business monitoring center is operated by government financial support to protect and prevent these threats. Currently it provides security to about 900 small and medium-sized enterprises. This paper studies abnormal and attack packets from small and medium-sized businesses[enterprises] which is monitored by Small and Medium Business monitoring center and provides improvement of security control for small and medium-sized enterprises.

IIoTBC: A Lightweight Block Cipher for Industrial IoT Security

  • Juanli, Kuang;Ying, Guo;Lang, Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.97-119
    • /
    • 2023
  • The number of industrial Internet of Things (IoT) users is increasing rapidly. Lightweight block ciphers have started to be used to protect the privacy of users. Hardware-oriented security design should fully consider the use of fewer hardware devices when the function is fully realized. Thus, this paper designs a lightweight block cipher IIoTBC for industrial IoT security. IIoTBC system structure is variable and flexibly adapts to nodes with different security requirements. This paper proposes a 4×4 S-box that achieves a good balance between area overhead and cryptographic properties. In addition, this paper proposes a preprocessing method for 4×4 S-box logic gate expressions, which makes it easier to obtain better area, running time, and power data in ASIC implementation. Applying it to 14 classic lightweight block cipher S-boxes, the results show that is feasible. A series of performance tests and security evaluations were performed on the IIoTBC. As shown by experiments and data comparisons, IIoTBC is compact and secure in industrial IoT sensor nodes. Finally, IIoTBC has been implemented on a temperature state acquisition platform to simulate encrypted transmission of temperature in an industrial environment.

Analysis of IT security threats and countermeasures in a network-separated environment (망분리 환경에서의 IT 보안 위협 및 대응 방법 분석)

  • Kim, chang Seok;Kim, Jong-min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.638-640
    • /
    • 2021
  • The network separation environment is a network security design system that separates the internal business network from the external Internet network. It separates the internal business network from the external Internet by separating it into a business network that is not connected to the network to which the Internet is connected. The network is separated, and it is a relatively secure network structure compared to Danilman in terms of security. However, there are frequent cases of infecting internal networks by using vulnerabilities in internal systems, network devices, and security devices. In this paper, we analyze the vulnerability of IT security threats in such a network isolation environment and provide technical measures for effective security monitoring.

  • PDF

Development of Macro Program Detection System using Access_log (Access_log를 활용한 매크로 프로그램 탐지 시스템 개발)

  • Kim, Jun-young;Kim, Kyu-rim;Park, Han-sol;An, Seung-hwan;Lee, Hyun-tak;Choi, Sang-Yong;Lee, Jong-Rak
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.103-106
    • /
    • 2020
  • 매크로 프로그램에 의한 피해는 꾸준히 보고되어 왔다. 최근 코로나 19로 인해 마스크 품귀 현상이 발생하여 매크로 프로그램을 이용한 구매가 사회적 이슈로 떠오르면서 매크로에 대하여 법적 처벌을 하는 등 매크로에 대한 관심이 부각되고 있다. 본 논문에서는 매크로 프로그램을 효과적으로 탐지하기 위한 방법을 제안한다. 본 논문에서는 매크로 탐지를 위해 access.log의 다양한 필드를 분석하고, 이 중 매크로 식별에 효과가 있는 필드를 추출하여 매크로를 탐지한다. 제안하는 기술의 효과성 검증을 위해 매크로의 공통적인 기능이 포함된 매크로 프로그램을 직접 제작하고, 실제 구매 웹사이트와 유사한 판매 사이트를 제작하여 실험을 통해 제안하는 방법이 매크로를 효과적으로 탐지하는 것을 보인다.

  • PDF

Improved Security for Fuzzy Fingerprint Vault Using Secret Sharing over a Security Token and a Server (비밀분산 기법을 이용한 보안토큰 기반 지문 퍼지볼트의 보안성 향상 방법)

  • Choi, Han-Na;Lee, Sung-Ju;Moon, Dae-Sung;Choi, Woo-Yong;Chung, Yong-Wha;Pan, Sung-Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.63-70
    • /
    • 2009
  • Recently, in the security token based authentication system, there is an increasing trend of using fingerprint for the token holder verification, instead of passwords. However, the security of the fingerprint data is particularly important as the possible compromise of the data will be permanent. In this paper, we propose an approach for secure fingerprint verification by distributing both the secret and the computation based on the fuzzy vault(a cryptographic construct which has been proposed for crypto-biometric systems). That is, a user fingerprint template which is applied to the fuzzy vault is divided into two parts, and each part is stored into a security token and a server, respectively. At distributing the fingerprint template, we consider both the security level and the verification accuracy. Then, the geometric hashing technique is applied to solve the fingerprint alignment problem, and this computation is also distributed over the combination of the security token and the server in the form of the challenge-response. Finally, the polynomial can be reconstructed from the accumulated real points from both the security token and the server. Based on the experimental results, we confirm that our proposed approach can perform the fuzzy vault-based fingerprint verification more securely on a combination of a security token and a server without significant degradation of the verification accuracy.