• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.032 seconds

Active Network for IP Traceback (IP 역추적을 위한 액티브 네트워크 기법 적용 방안)

  • 최병선;이성현;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.420-423
    • /
    • 2004
  • Advance of computer technique becomes efficient of business in recent years. It has become high-speed data transmission and large data transmission. Network and computer system need to increasingly security because advance of computer technique. So this paper analyzes IP Traceback system that prevent cyber attack as hacking and security vulnerability of network. And this paper design IP Traceback system that based on active network.

  • PDF

Study on Real-time Cooperation Protect System Against Hacking Attacks of WiBro Service

  • Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.353-357
    • /
    • 2011
  • U.S. Obama government is submit a motion to consider cyber attacks on State as a war. 7.7DDoS attack in Korea in 2009 and 3.4 DDoS attacks 2011, the country can be considered about cyber attacks. China hackers access a third country, bypassing South Korea IP by hacking the e-commerce sites with fake account, that incident was damaging finance. In this paper, for WiBro service, DDoS attacks, hackers, security incidents and vulnerabilities to the analysis. From hacker's attack, WiBro service's prognostic relevance by analyzing symptoms and attacks, in real time, Divide Red, Orange, Yellow, Green belonging to the risk rating. For hackers to create a blacklist, to defend against attacks in real-time air-conditioning system is the study of security. WiBro networks for incident tracking and detection after the packets through the national incident response should contribute to the development of technology.

A Model for Illegal File Access Tracking Using Windows Logs and Elastic Stack

  • Kim, Jisun;Jo, Eulhan;Lee, Sungwon;Cho, Taenam
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.772-786
    • /
    • 2021
  • The process of tracking suspicious behavior manually on a system and gathering evidence are labor-intensive, variable, and experience-dependent. The system logs are the most important sources for evidences in this process. However, in the Microsoft Windows operating system, the action events are irregular and the log structure is difficult to audit. In this paper, we propose a model that overcomes these problems and efficiently analyzes Microsoft Windows logs. The proposed model extracts lists of both common and key events from the Microsoft Windows logs to determine detailed actions. In addition, we show an approach based on the proposed model applied to track illegal file access. The proposed approach employs three-step tracking templates using Elastic Stack as well as key-event, common-event lists and identify event lists, which enables visualization of the data for analysis. Using the three-step model, analysts can adjust the depth of their analysis.

Atomic Micropayment System for mobile Computing Environment (이동컴퓨팅 환경에서 트랜잭션의 원자성을 보장하는 소액지불시스템)

  • 김상진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.2
    • /
    • pp.55-66
    • /
    • 2000
  • 이동컴퓨팅 환경은 기존의 컴퓨팅 환경과는 달리 호스트의 이동성과 무선 통신의 특성을 고려하여야 한다. 기존의 지불시스템들은 이와 같은 특성을 고려하지 않고 설계되었기 때문에 이동컴퓨팅 환경에서 이를 효율적으로 사용할 수 없다 본 논문에서는 이동컴퓨팅 환경에서 소액지불을 위한 새로운 전자지불시스템 AMPS(Atomic Micropayment System)를 제안한다. 이시스템은 고객인 이동 호스트의 연산 부담과 무선 통신 메시지의 수를 최소화하도록 설계되었다 AMPS 는 고객의 요청이 들어오면 대행 서버를 통해 고객을 대신하여 유선망에서 판매자를 상대로 상품거래를 대행하여 준다. AMPS는 소액의 디지털 상품 구매를 위한 지불시스템으로 지불 트랜잭션의 원자성(atomicity)을 보장한다. 또한 판매자와 제 3자로부터 고객의 익명성과 대행 서버가 구매 상품 내역에 대해 알수 없도록 구매 상품의 비밀을 보장한다. AMPS 프로토콜의 안정성과 효율성에 대해서도 분석하였다.

Design of DRM Frame for Digital Contents Protection in Network (네트워크 상에서 디지털 콘텐츠 보호를 위한 DRM 프레임 설계)

  • Kim Jong-Woo;Han Seung-Jo;Yang Won-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.101-113
    • /
    • 2006
  • This study is intended to provide more secure contents authentication and user authentication by applying public key algorithm and hardware binding to the DRM system. The proposed system is capable of protecting distributed contents and copyrights as well as resetting any interoperability issues among those involved in transparent and secure contents distribution. The proposed algorithm also affords transparency in the DRM distribution system and protection from unauthorized distribution.

Modernization of Education in the Context of Informatization and Automation

  • Moroz, Liudmyla;Shabelnyk, Tetiana;Zelinska-Liubchenko, Kateryna;Varakuta, Volodymyr;Push, Olena;Vysochan, Lesia;Blahun, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.41-46
    • /
    • 2021
  • The article studies the implementation of automation in the education process as a convenient interface of a document management system, on the one hand, which makes it easy to navigate the program, requiring from the user only a small amount of any special skills in working with electronic computers, on the other hand, it provides to the user operational information about all the data of interest to him, taking into account the access rights given to this or that information, stored in the enterprise database.

Implementation of University Point Distributed System based on Public Blockchain (퍼블릭 블록체인기반 대학 포인트 분산 시스템 개발)

  • Jung, Se-Hoon;Kim, Jeong Hoon;Sim, Chun-Bo
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.2
    • /
    • pp.255-266
    • /
    • 2021
  • Most common web or application system architectures have central network. As a result, central network can be supervised and controlled in all situation. And It has the advantage of easy to manage and fast to work. However, central network have a disadvantage of weak to security and unclear. In particular, many institutions used by web system be has many problems by central network. In this paper, we proposed blokchain technology based on ethereum to resolve of problem and trading structure that arise in cental network. We propose a decentralized application based on points including cryptocurrency functions and smart contract to the advantages of blockchain with a decentralized structure. The results of the performance experiment are as follows; It has shown the advantages of reliable use and security in a variety of environments(Windows, Ubuntu, Mac).

Application Of Electronic Information And Educational Environment In Innovative Educational Activities

  • Taranenko, Yuliia;Buhaiets, Nataliia;Kyrychenko, Rymma;Cherniak, Daryna;Mnozhynska, Ruslana;Paskevska, Iuliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.366-370
    • /
    • 2022
  • The article deals with the theoretical and methodological foundations of innovative approaches in the modern education system. The issues of introducing computerized and telecommunication technologies are characterized, which allow switching to distance learning (DL), which is a promising form of the system of open education support in the modern educational process. Special attention is paid to the study of practical technologies of vocational training and the activities of a teacher and innovative areas of vocational training of students.

Information And Communication Communication Technologies In The System Of Distance Education

  • Hubarieva, Daria;Polisuchenko, Anna;Matviienko, Olena;Savenko, Oksana;Hrebnieva, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.287-293
    • /
    • 2021
  • The purpose of this article is to consider the distance education system, its principles, features and means. One of its existing and promising tools is video conferencing. The article discusses the types of video conferencing, hardware and software, features and requirements for communication channels, types of information transmitted through these channels.

Lightweight Capability-Based Access Control System on File Descriptor via ARM PA (ARM PA를 통한 경량화된 파일 디스크립터 권한 관리 시스템)

  • Kyuwon Cho;Hojoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.319-323
    • /
    • 2023
  • In intra-process isolation, file descriptors work as another attack vector from the memory corruption attacks. The attacker can read or write by corrupting file descriptors so they can escape the isolation. In this paper, we propose new lightweight capability-based access control system on file descriptor using ARM's hardware extension, PA(Pointer Authentication). Our system was implemented on Linux kernel module, only shows 5% overhead to control the access on the file descriptor.