• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.032 seconds

A Study on Analysis and Control of Circumvent Connection to the Private Network of Corporation (기업 사설 네트워크 우회 접속 분석 및 통제 대책 연구)

  • Lee, Chul-Won;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.183-194
    • /
    • 2010
  • A company's private network protected by a firewall and NAT(Network Address Translation) is not accessible directly through an external internet. However, as Reverse Connection technology used by NetCat extends to the technologies such as SSH Tunnel or HTTP Tunnel, now anyone can easily access a private network of corporation protected by a firewall and NAT. Furthermore, while these kinds of technologies are commercially stretching out to various services such as a remote control and HTTP Tunnel, security managers in a company or general users are confused under the circumstances of inner or outer regulation which is not allowed to access to an internal system with a remote control. What is more serious is to make a covert channel invading a company's private network through a malicious code and all that technologies. By the way, what matters is that a given security system such as a firewall cannot shield from these perceived dangers. So, we analyze the indirect access of technological methods and the status quo about a company's internal network and find a solution to get rid of the related dangers.

Implementation of Security Information and Event Management for Realtime Anomaly Detection and Visualization (실시간 이상 행위 탐지 및 시각화 작업을 위한 보안 정보 관리 시스템 구현)

  • Kim, Nam Gyun;Park, Sang Seon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.303-314
    • /
    • 2018
  • In the past few years, government agencies and corporations have succumbed to stealthy, tailored cyberattacks designed to exploit vulnerabilities, disrupt operations and steal valuable information. Security Information and Event Management (SIEM) is useful tool for cyberattacks. SIEM solutions are available in the market but they are too expensive and difficult to use. Then we implemented basic SIEM functions to research and development for future security solutions. We focus on collection, aggregation and analysis of real-time logs from host. This tool allows parsing and search of log data for forensics. Beyond just log management it uses intrusion detection and prioritize of security events inform and support alerting to user. We select Elastic Stack to process and visualization of these security informations. Elastic Stack is a very useful tool for finding information from large data, identifying correlations and creating rich visualizations for monitoring. We suggested using vulnerability check results on our SIEM. We have attacked to the host and got real time user activity for monitoring, alerting and security auditing based this security information management.

Development of Automated Risk Analysis Tools(HAWK) for Information System Environments (전산 시스템 보안을 위한 자동화 위험분석 도구 (HAWK: Hankuk risk Analysis Watch-out Kit)의 개발에 관한 연구)

  • Yoon, Jeong-Won;Shin, Soon-Ja;Kim, Ki-Su;Lee, Byung-Man;Song, Kwan-Ho
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1996.11a
    • /
    • pp.65-74
    • /
    • 1996
  • Risk analysis is time-consuming and expensive process〔1〕〔6〕. Automated risk analysis tools have been widely used in industry and government to support decision making process and reduce cost. However, difficulties in materializing impact of threats and fast-changing network environments make analysis process more complicated and less trusted since impacts are relative in network environments. HAWK system is developed to improve the accuracy of analysis result in network-oriented environment. It provides user-friendly environments and considers network environments as primary assets.

  • PDF

A Study on Improving the Reliability of Cloud Computing (클라우드 컴퓨팅의 신뢰성 향상 방안에 관한 연구)

  • Yang, Jeong Mo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.107-113
    • /
    • 2012
  • Cloud computing has brought changes to the IT environment. Due to the spread of LTE, users of cloud services are growing more. This which provides IT resources to meet the needs of users of cloud services are noted as a core industry. But it is not activated because of the security of personal data and the safety of the service. In order to solve this, intrusion detection system is constructed as follows. This protects individual data safely which exists in the cloud and also protects information exhaustively from malicious attack. The cause of most attack risk which exists to cloud computing can find in distributed environment. In this study, we analyzed about necessary property of network-based intrusion detection system that process and analyze large amount of data which occur in cloud computing environment. Also, we studied functions which detect and correspond attack occurred in interior of virtualization.

A Study on GIS Metwork Security (지리공간 유통망 보안 방안에 관한 연구)

  • Kim, Ji-Hong;Lim, Gi-Uk
    • Journal of Korea Spatial Information System Society
    • /
    • v.3 no.2 s.6
    • /
    • pp.53-61
    • /
    • 2001
  • The GIS Network consists of the Clearinghouse Network Gateway and Clearinghouse Node and Geo-spatial Data Server. Recently with the development of Information and Network technologies, GIS Network should be needed to be more secure than ever. In this paper, we proposed the effective access control method for the distributed GIS network. PKI (Public Key Infrastructure) Technologies are used for access control and security for transmission on Geo-spatial data

  • PDF

Shift in Warfare Paradigm and Military Transformation (전쟁패러다임의 전환과 군사변혁)

  • Jeong, Chun-Il
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.381-418
    • /
    • 2006
  • In present, advanced countries in the world are seen concentring on Military Transformation to create new military capability as there is a shift in Warfare Paradigm. Rapid development of technology enables military system, operational concept and organization innovated. As a result, Revolution in Military Affairs(RMA) that dramatically increased warfighting capability is pursued. Especially, advanced information technology constructs system of systems with abilities of battle visualization, information sharing in battlefield, long-range strike capability that are interoperable and combined. Corresponding to this, engagement methods and organizations are being progressively developed. The purpose of this thesis is overview of newly developing Warfare Paradigm and analysis of tendency of Military Transformation that advanced countries are pursuing preparation to this. Above all, specific aspects and contents of the Warfare Paradigm which emerged by information age were summarized. Subsequently, Military Transformation which provides the basic concepts and principles to the advanced countries in the world for the creation of new military capability was discussed. In conclusion, the tendency of Military Transformation by U.S.A, Japan, China, and Russia surround the Korean peninsular as the major power in military was carefully observed.

  • PDF

A Development of Access Management System Server Based on Smartphone (스마트폰 기반의 출입관리시스템 서버 개발)

  • Lim, Ji-yong;Oh, Am-suk;Kim, Gwan-Hyung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.325-326
    • /
    • 2015
  • 본 논문은 스마트폰 기반의 출입관리시스템을 목표로 하며, 이를 위한 출입관리시스템 서버를 개발하였다. 출입관리시스템 서버에서는 자동개폐기를 제어하고 출입자의 권한관리, 출입 및 점검 이력 등 체계적인 출입관리를 한다. 그리고 자동개폐기 동작에 관한 상태정보를 스마트폰 앱으로 전송하여 원격지 서버에서의 실시간 모니터링을 제공한다.

  • PDF

Design and Implementation of Utility-Pipe Conduit Access Control System Using Smart Phone (스마트 폰을 이용한 지하공동구 출입관리시스템 설계 및 구현)

  • Lim, Ji-yong;Oh, Am-suk;Kim, Gwan-Hyung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.327-328
    • /
    • 2015
  • 본 논문은 지하공동구에서의 출입자의 통제를 위해 스마트폰을 이용한 출입관리시스템을 제안한다. 제안하는 시스템은 지하공동구 자동개폐기의 MCU를 통해 온습도, 개폐기의 상태, 출입자의 기록 등 다양한 정보를 취득하여 관리한다. 이때 취득한 정보는 블루투스4.0 모듈을 통해 ECB 암호화 방식을 사용하여 스마트폰에 전송한다. 본 논문에서 제안하는 출입관리시스템은 기존 물리적인 키에 의존하던 출입 방식을 대체하여 신뢰성 있는 보안 및 체계적인 관리가 가능할 것으로 기대한다.

  • PDF

Improving Performance of HPC Clusters by Including Non-Dedicated Nodes on a LAN (LAN상의 비전용 노드를 포함한 HPC 클러스터의 확장에 의한 성능 향상)

  • Park, Pil-Seong
    • Journal of Information Technology Services
    • /
    • v.7 no.4
    • /
    • pp.209-219
    • /
    • 2008
  • Recently the number of Internet firms providing useful information like weather forecast data is growing. However most of such information is not prepared in accordance with customers' demand, resulting in relatively low customer satisfaction. To upgrade the service quality, it is recommended to devise a system for customers to get involved in the process of service production, which normally requires a huge investment on supporting computer systems like clusters. In this paper, as a way to cut down the budget for computer systems but to improve the performance, we extend the HPC cluster system to include other Internet servers working independently on the same LAN, to make use of their idle times. We also deal with some issues resulting from the extension, like the security problem and a possible deadlock caused by overload on some non-dedicated nodes. At the end, we apply the technique in the solution of some 2D grid problem.

Design & Implementation of a Host Based Access Control System (호스트 기반 접근제어시스템의 설계 및 구현)

  • Kim, Jin-Chun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.34-39
    • /
    • 2007
  • According to the active use of internet the need for security in various environment is being emphasized. Moreover with the broad use of Messenger on PC and P2P applications. the security and management of individual hosts on internet became very important issues. Therefore in this paper we propose the design and implementation of a host based access control system for the hosts on internet including window based PC which provides access control, information on packets, and record and monitoring of log files.