• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.032 seconds

SDN-Based Intrusion Prevention System for Science DMZ (Science DMZ 적용을 위한 SDN 기반의 네트워크 침입 방지 시스템)

  • Jo, Jinyong;Jang, Heejin;Lee, Kyungmin;Kong, JongUk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.6
    • /
    • pp.1070-1080
    • /
    • 2015
  • In this paper, we introduce an SDN-based intrusion prevention system for more secure Science DMZ with no performance limits. The proposed system is structured with intrusion-prevention, intrusion-detection, and prevention-decision subsystems which are physically distributed but informationally connected by an SDN interface. The functional distribution and the application of SDN technology increase the flexibility and extensibility of the proposed system and prevent performance degradation possibly caused by network security equipments on Science DMZ. We verified the feasibility and performance of the proposed system over a testbed set up at KREONET.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

A Web-Based IPTV Content Syndication System for Personalized Content Guide

  • Yang, Jinhong;Park, Hyojin;Lee, Gyu Myoung;Choi, Jun Kyun
    • Journal of Communications and Networks
    • /
    • v.17 no.1
    • /
    • pp.67-74
    • /
    • 2015
  • In this paper, we propose a web-based content syndication system in which users can easily choose Internet protocol television (IPTV) contents. This system generates personalized content guide to provide a list of IPTV contents with respect to users' interests and statistics information of their online social community. For this, IPTV contents and relevant metadata are collected from various sources and transformed. Then, the service and content metadata are processed by user metadata including audience measurement and community metadata. The metadata flows are separated from content flows of transport network. The implementation of IPTV content syndication system demonstrates how to arrange IPTV contents efficiently from content providers to the end user's screen. We also show that the user metadata including online community information are important for the system's performance and the user's satisfaction.

Design and Implementation of a Proxy-based Mobile Grid Services Framework (프록시 기반의 모바일 그리드 서비스 프레임워크 설계 및 구현)

  • Kim, Min-Gyu;Park, Si-Yong;Lee, Bong-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.85-98
    • /
    • 2007
  • In distributed computing paradigm, mobile surrogate systems have not gained wide acceptance because of security concerns that have not been suitably addressed yet. Currently even the widely used Grid middleware, Globus, does not have a host authentication mechanism, which makes it hard to provide high performance Grid computing capabilities to mobile clients. In this paper, a mobile Grid service framework is designed and implemented in order to provide Grid services to mobile host such as PDA. The surrogate host-based system allows mobile hosts to be provided with Grid services while moving. The implemented mobile Grid services system has been applied to mobile healthcare system which utilizes Grid computing for ECG signal processing. The presented system framework can be used as a secure enterprise mobile healthcare system for hospital physicians.

  • PDF

Trusted Third Party for Clearing Consumption Tax of Global Electronic Commerce and System Architecture of Global Electronic Tax Invoice (GETI)

  • Yeoul , Hwang-Bo;Jung, Yang-Ook
    • Proceedings of the CALSEC Conference
    • /
    • 2003.09a
    • /
    • pp.261-267
    • /
    • 2003
  • This study deals with controversial issues surrounding the today′s cyber-taxation and recommends feasible consumption tax system architecture titled Global Electronic Tax Invoice System (GETI). The GETI is an electronic consumption tax architecture to provide "all-in-one" tax and e-payment services through a trusted third party (TTP). GETI is designed to streamline the overall cyber-taxation process and provide simplified and transparent tax invoice services through an authorized np. To ensure information security, GETI incorporates public Key infrastructure (PKI) based digital certificates and other data encryption schemes when calculating, reporting, paying, and auditing tax in the electronic commerce environment. GETI is based on the OECD cyber-taxation agreement that was reached in January 2001, which established the taxation model for B2B and B2C electronic commerce transactions. For the value added tax systems, tax invoice is indispensable to commerce activities, since they provide documentations to prove the validity of commercial transactions. As paper-based tax invoice systems are gradually phased out and are replaced with electronic tax invoice systems, there is an increasing need to develop a reliable, efficient, transparent, and secured cyber-taxation architecture. To design such architecture, several desirable system attributes were considered -- reliability, efficiency, transparency, and security. GETI was developed with these system attributes in mind.

  • PDF

Design on Smart Security Disk System with Wireless Interface of High Definition Image (고해상도 영상의 무선 인터페이스를 갖는 스마트 보안 디스크 시스템의 설계)

  • Kim, Won
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.195-200
    • /
    • 2013
  • In visual surveillance system abandoned objects in public places are the deliberately left things, which should be automatically detected by intelligent systems in the environment where the number of cameras is increasing. This research deals with the design scheme of a smart security disk system which can detect these abandoned objects automatically and save the relevant image information with the wireless interface of high definition images. By implementing the proposed system in this research it is confirmed that the transmission performance shows 60 frames per second without compression of high definition images and the capability of the disk system shows the relevant images can be saved in a RAID configuration. Also, the proposed visual surveillance software shows a good detection rate of 80% in PAT performance.

A Lock System Design Using LCD Barcode of Cellular Phone (휴대폰의 액정 바코드를 이용한 Lock시스템 설계)

  • 곽현민;저광일;조해성;채균식;이상태
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.9
    • /
    • pp.1-7
    • /
    • 2004
  • This thesis shows embodiment of lock system design for combination of usefulness, convenient of Barcode and cellular phone. This thesis consists of Lock system design using cellular phone and product introduction, including details from formation of barcode scanner to scanner design. When this research is applied to security system a general idea of physical key disappears and it is Possible that cellular phone becomes the center of security and we can expect that cellular phone use for payment will increase due to mutual direction service. After, we should study its application to various practical field and develop high sensitive equipment.

A Study on effective risk analysis and evaluation method of cloud computing system environment (클라우드컴퓨팅 시스템 환경의 효과적 위험분석평가 방법에 관한 연구)

  • Lee, Junglimg;Chang, Hangbae
    • Journal of Platform Technology
    • /
    • v.9 no.2
    • /
    • pp.10-25
    • /
    • 2021
  • Although many studies have been conducted on risk analysis and evaluation in the on-premises environment in information security, studies on effective methodologies of risk analysis and evaluation for cloud computing systems are lacking. In 2015, the Cloud Computing Development Act was enacted, which served as an opportunity to promote the introduction of cloud computing. However, due to the increase in security incidents in the cloud computing system, activation is insufficient. In addition, the cloud computing system is not being actively introduced because of the difficulty in understanding the cloud computing system technology of the person in charge who intends to introduce the cloud computing system. In this regard, this study presented an effective risk analysis and evaluation method by examining the characteristics, concepts, and models of cloud computing systems and analyzing how these characteristics affect risk analysis and evaluation.

Development of User-dependent Mid-point Navigation System (사용자 중심의 중간지점 탐색 시스템의 설계 및 구현)

  • Ahn, Jonghee;Kang, Inhyeok;Seo, Seyeong;Kim, Taewoo;Heo, Yusung;Ahn, Yonghak
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.73-81
    • /
    • 2019
  • In this paper, we propose a user-dependent mid-point navigation system using a time weighted mid-point navigation algorithm and a user preference based mid-point neighborhood recommendation system. The proposed system consists of a mid-point navigation module for calculating an mid-point by applying a time weight of each user based on a departure point between users, and a search module for providing a search for a route to the calculated mid-point. In addition, based on the mid-point search result, it is possible to increase the utilization rate of users by including a place recommending function based on user's preference. Experimental results show that the proposed system can increase the efficiency of using by the user-dependent mid-point navigation and place recommendation function.

Impact of Digitalization On the Banking System Transformation

  • Shcherbatykh, Denis;Shpileva, Vira;Riabokin, Maryna;Zham, Olena;Zalizniuk, Viktoriia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.513-520
    • /
    • 2021
  • The purpose of the article is to study the impact of digitalization on the transformation of the banking system, taking into account current innovative development trends. The article analyzes the impact of key factors on the development of the digital economy. Ukraine's ranking positions in terms of digital competitiveness are shown. The necessity of using digital technologies in the sphere of banking activity is substantiated. The dynamics of changes in the number of operating banks in Ukraine is analyzed. The directions of introduction of information technologies in the sphere of banking activity are determined. An analysis of changes in the share of the population of individual EU member states that use the Internet for Internet banking. It is noted that modern transformation trends, digitalization of the economy have a significant impact on the landscape of the banking sector, in this context, the rating of Ukrainian banks in the categories of "Internet Banking" and "Mobile Banking". The advantages and disadvantages of using the capabilities of Internet banking are identified. Based on the study, the importance of expanding the boundaries of digitalization of the domestic banking system is substantiated, which will further increase the level of availability of online services in the field of banking. Prospects for further research are identified in the study of the impact of digitalization on the development of the banking system of foreign countries.