A Design for Network Security System via Non-security Common Network

일반망과 보안망을 연계한 네트워크 보안체계 설계

  • Published : 2009.10.05

Abstract

In this paper, we have proposed a design for security network system passing through the non-security network which is commonly used for various networking services. Based on the security requirements which are assumed that the large classified data are bi-transmitted between a server and several terminals remotely located, some application methods of security techniques are suggested such as the network separation technique, the scale-down application technique of certification management system based on the PKI(Public Key Infrastructure), the double encryption application using the crypto-equipment and the asymmetric keys encryption algorithm, unrecoverable data deleting technique and system access control using USB device. It is expected that the application of this design technique for the security network causes to increase the efficiency of the existing network facilities and reduce the cost for developing and maintaining of new and traditional network security systems.

Keywords

References

  1. 김이형, '생체/지문인식 기술동향 보고서', 국방과학연구소, IEDC-509-010845, 2001
  2. 문은점, 도경철, 조창봉, '다중매체 DB 보안시스템 구축 개념 연구', 국방과학연구소, NSDC-514-041387, 2004
  3. 박영호, '정보보안을 위한 암호학-공개키 암호', 물리학과 첨단기술, pp. 7-12, 2007
  4. 양대일, '정보 보안 개론', 한빛미디어, 2009
  5. 양상운, 김영진, 박중길, '군 PKI 구축 방안에 관한 연구', 통신/전자 학술대회 논문집, pp. 227-283, 1998
  6. 이윤경, 박찬호, 권영찬, 강수현, 윤호상, 장희진, 김철호, 'Gap기술을 활용한 보안 네트워크 게이트 웨이 구성에 관한 연구', 통신/전자 학술대회 논문집, pp. 65-69, 2007
  7. 임철수, TCP/IP 인터넷트워킹, 도서출판 그린, 2003
  8. Kevin Gennuso, Disconnect from the Internet-Whale's e-Gap In-Depth, SANS Institute InfoSec Reading Room, Sep. 13, 2001
  9. Michael Bobbtt, '(UN)BRIDGING THE GAP', http://infosecuritymag.techtarget.com/articles/july00/cov er.shtml