• 제목/요약/키워드: web security

검색결과 1,092건 처리시간 0.029초

Research on Intrusion Detection Visualization using Web Log Data set (웹 로그 데이터셋을 이용한 침입 상태 시각화 방안에 관한 연구)

  • Lee, Su-Young;Koo, Bon-Hyun;Cho, Jae-Ik;Cho, Kyu-Hyung;Moon, Jong-Sub
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 한국방송공학회 2007년도 동계학술대회
    • /
    • pp.134-137
    • /
    • 2007
  • 최근 인터넷 사용이 폭발적으로 증가함과 더불어 웹 어플리케이션에 대한 다양한 공격이 발생하고 있다 이런 다양한 웹 공격에 대해 방어를 위해서는 효율적인 침입탐지가 가능하여야 하며, 이상행위에 대해 신속하고 적절한 정보전달이 필요하다. 다양한 보안 이벤트들에 대한 시각화 시스템은 이를 만족시켜주는 수단이다. 본 논문에서는 선행 연구였던 웹 공격 기법에 대해 분석해보고 시각화 기법을 살펴본 후, 이를 개선하여 기존 시각화 기법으로는 표현하지 못했던 웹 로그 데이터셋에 기초한 웹 이상행위의 시각화기법을 제안한다. 웹 침입탐지 시각화 시스템을 바탕으로 다양한 웹 공격에 대한 시각화 실험결과를 제시한다.

  • PDF

Applying Semantic Web to Security Policy for Location Based Services (위치기반서비스를 위한 보안정책에서의 시맨틱웹 활용)

  • Kim Jong-Woo;Kim Chang-Soo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.89-92
    • /
    • 2006
  • 위치기반서비스는 이동중인 사용자에게 위치와 관련된 정보의 제공을 중심으로 부가가치를 창출할 수 있는 정보를 제공하는 서비스로, 다양하고 방대한 분량의 데이터를 관리하기 때문에 분산환경에서 운용되는 것이 효율적이다. 본 논문에서는 위치기반서비스에서 이렇게 분산 저장된 리소스들에 대한 접근제어 정책을 공유하기 위해 시맨틱 웹 기술을 활용할 수 있는 방법을 제안하한다. 이를 위하여 LBSPolicy 온톨로지를 정의하고 이를 기반으로 보안정책을 명세화할 수 있도록 하고, 이를 활용할 수 있는 서비스 구조를 제시한다.

  • PDF

Design and Implementation of the Intrusion Detection Data Web-based Management System on Heterogeneous Environments (이기종간 침입탐지 정보에 대한 웹기반 관리 시스템 설계)

  • Kim, Eun-Soo;Kim, Seok-Hun;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • 제5권2호
    • /
    • pp.65-74
    • /
    • 2005
  • The hacking accident is increasing repidly according to development of latest computer network and the method becomes various. But, to correspond to hacking, it is lot of difficulties to cope gear and security element between product because most radiant mercuries apply technology between individual digenomic species and It is real condition that great setup, equipment, manpower disturbance are enlarged to apply this. Designed and embody Site-Based executive system that can integrate security element about IDS information between digenomic species to solve these problem and correspond efficiently from hacking.

  • PDF

An Log Visualization Method of Network Security Equipment for Private Information Security (개인정보 보호를 위한 네트워크 보안장비의 로그 가시화 방법 연구)

  • Sim, Hee-Youn;Kim, Hyung-Jong
    • Convergence Security Journal
    • /
    • 제8권4호
    • /
    • pp.31-40
    • /
    • 2008
  • Recently, network forensic research which analyzes intrusion-related information for tracing of attackers, has been becoming more popular than disk forensic which analyzes remaining evidences in a system. Analysis and correlation of logs from firewall, IDS(Intrusion Detect System) and web server are important part in network forensic procedures. This work suggests integrated graphical user interface of network forensic for private information leakage detection. This paper shows the necessity of various log information for network forensic and a design of graphical user interface for security managers who need to monitor the leakage of private information.

  • PDF

Importance-Based Security Level Verification in Web Services (웹 서비스에서 중요도 기반 보안수준 검증)

  • Hung, Pham Phuoc;Nasridinov, Aziz;Byun, Jeongyong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2010년도 추계학술발표대회
    • /
    • pp.1279-1280
    • /
    • 2010
  • There are some cases when SOAP message, where WS-Security and WS-Policy elements are included, may consist of a sensitive and important data. In these cases, the message is highly recommended to be secured. The question exists of how to quickly identify that SOAP message satisfies security requirement and security level of a SOAP message. In this paper, we propose a technique called Bit-Stream which depends on the importance of SOAP elements to automatically identify the vulnerabilities and risks while offering advice for higher security.

Behavioral Tendency Analysis towards E-Participation for Voting in Political Elections using Social Web

  • Hussain Saleem;Jamshed Butt;Altaf H. Nizamani;Amin Lalani;Fawwad Alam;Samina Saleem
    • International Journal of Computer Science & Network Security
    • /
    • 제24권2호
    • /
    • pp.189-195
    • /
    • 2024
  • The issue "Exploring Social Media and Other Crucial Success Elements of Attitude towards Politics and Intention for Voting in Pakistan" is a huge study embracing more issues. The politics of Pakistan is basically the politics of semantic groups. Pakistan is a multilingual state more than six languages. There are 245 religious parties in Pakistan, as elaborated by the Daily Times research. The use of social media sites in Pakistan peaked to its maximum after announcement of election schedule by the Election Commission of Pakistan in March 22, 2013. Most of the political parties used it for the recent elections in Pakistan to promote their agenda and attract country's 80 million registered electors. This study was aiming to investigate the role of social media and other critical variables in the attitude towards politics and intention for voting.

Web-based HLS(Http Live Streaming) Multi-view System for Real-time High Quality Video (실시간 고화질 영상에 대한 웹기반의 HLS 멀티뷰 시스템 설계)

  • Kim, Dae-Jin
    • The Journal of the Korea Contents Association
    • /
    • 제17권11호
    • /
    • pp.312-318
    • /
    • 2017
  • In recent years, a high-quality video input device has been generalized, and a central control system capable of simultaneously viewing video input in real time has become an essential element. At this time, there are attempts to access through the web without installing the program separately. However, if multiple high-quality videos are simultaneously viewed through the web browser, the web browser is terminated by force. In this paper, we propose a web-based HLS(HTTP Live Streaming) multi-view system for real-time high-definition video. We have reconstructed the multi-view screen as a screen by transcoding and implemented a system that can monitor multiple video inputs through a web browser on the fly without using security vulnerability ActiveX.

Web-Based Information Security Leveling Tool (웹 기반 정보보안 수준 측정 도구 설계)

  • Sung, Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • 제10권4호
    • /
    • pp.375-384
    • /
    • 2005
  • As the development of information communication technology and thus the growth of security incidents, there has been increasing demand on developing methodologies and tools for measuring the information security level of organizations for the efficient security management. However, most works from foreign countries are not realistic in constructing the checklists, moreover their tools provide neither the ease of use nor the inexpensiveness, and most domestic works are not properly considering the characteristics of the organizations when measuring the information security level. In this study, an efficient information security levelling tool is suggested, which applies the multiple variable weights for security levelling according to the characteristics of organizations and the fuzzy technique to reduce the user's subjectivity and the genetic algorithm to establish the security countermeasure.

  • PDF

Profile based Web Application Attack Detection and Filtering Method (프로파일기반 웹 어플리케이션 공격탐지 및 필터링 기법)

  • Yun Young-Tae;Ryou Jae-Cheol;Park Sang-Seo;Park Jong-Wook
    • The KIPS Transactions:PartC
    • /
    • 제13C권1호
    • /
    • pp.19-26
    • /
    • 2006
  • Recently, web server hacking is trending toward web application hacking which uses comparatively vulnerable web applications based on open sources. And, it is possible to hack databases using web interfaces because web servers are usually connected databases. Web application attacks use vulnerabilities not in web server itself, but in web application structure, logical error and code error. It is difficult to defend web applications from various attacks by only using pattern matching detection method and code modification. In this paper, we propose a method to secure the web applications based on profiling which can detect and filter out abnormal web application requests.