DOI QR코드

DOI QR Code

홍수 및 환경 감시망의 보안성 강화를 위한 단방향 Bypass TAP 장치 개발에 관한 연구

A Study on the Development of One-way Bypass TAP Device for Strengthening the Security of Flood and Environment Surveillance Network

  • 이진영 (강남대학교 교양학부) ;
  • 공헌택 (공주대학교 컴퓨터 공학부)
  • 투고 : 2015.06.15
  • 심사 : 2015.08.20
  • 발행 : 2015.08.28

초록

강 유역의 홍수 및 환경 감시망은 고품질의 영상정보를 고속으로 전달할 수 있는 광통신 장치와 함께 각종 센서로 부터의 정보를 효율적으로 관리할 수 있는 방법이 요구되는 네트워크이다. 특히, 네트워크의 절단이나 노화로 인한 통신장애들은 현장에서의 신속한 복구가 매우 중요하기 때문에 다양한 연구가 진행되고 있다. 그러나, 국가 기간망과 같은 환경 감시망은 외부의 해킹이나 불법적인 목적의 외부침입에 대한 보안이 매우 중요하기 때문에 보안성과 신뢰성을 만족하면서도 효율적인 네트워크 유지보수가 가능하도록 하여야 한다. 이와같은 요구사항은 보안성을 제고하면 유지보수의 효율성이 떨어지는 서로 상충되는 특성을 가지고 있다. 따라서 본 연구에서는 보안성을 제고하기 위해 단방향 Bypass TAP를 개발하고 효율적인 유지보수가 가능하도록 안드로이드기반의 스마트폰용 앱을 개발하여 상반된 요구사항을 충족시킬 수 있도록 하는 시스템을 제안한다. 제안된 시스템은 통신 전송망 및 다양한 시설의 관리망 등 인터넷으로 부터의 침입에 의한 위험등에 대한 보안이 필요한 분야에서 폭넓게 이용될 것으로 판단된다.

The flood and environment surveillance network on riverside is a network requiring a way to efficiently manage the information from all kinds of sensors, along with an optical communication device that can deliver high-quality video information at high speed. Since on-site prompt recovery is very important especially for communication problems that occurred due to cut-off or aged network, various researches have been carried out on this. However, because the security against outside hacking or outside intrusion with illegal purposes is very important for environment surveillance network, such as the national backbone network, an efficient network maintenance and repair should be enabled while satisfying security and reliability at the same time. A characteristic of requirement is that when security is improved, the efficiency of maintenance and repair drops as they are conflicting to each other. Therefore, this research proposed a system in order to satisfy the conflicting requirement and improve security, by developing a one-way Bypass TAP and an android-based smartphone app that can enable efficient network maintenance and repair.

키워드

참고문헌

  1. H.J. Cho, T.W. Kim, S.A.Jung, A Study on Facilitating Communication and Collaboration among National Disaster Management Organization by Utilizing IT, Report of The Korea Institute of Public Administration, The Korea Institute of Public Administration, 2013-27, 2013.
  2. J.H. Yeom, G.Y. Kim, C.J. Chae, Protection and recovery technology of optical Internet, The journal of Korea Institute of Electronics Engineers, Vol. 27, NO. 6, pp.604-616, 2000.6
  3. Jin-Young Lee, "The study on the development of intelligent optical communication system to monitor flood and water pollution", The Journal of digital policy & management Vol. 10, NO. 11, pp.351-358, 2012.12.
  4. Joe Mocerino, "Carrier Class Enthernet Service Delivery Migrating SONET to IP & Triple Play Offerings", OFC/NFOEC, JThB97, pp.396-401, 2006.
  5. J.S. Kwan, D. H. Jo, "Standardization trends and future outlook for All IP Network", The journal of the Korean Institute of Communication Sciences, VOL..17, NO. 8, pp.109-116, 2000.8
  6. J.U. Kim, B.J. Ahn, Ethernet Transport Network Technology Trends Analysis, Institute for Information & communication Technology Promotion, Week Technology Trends, No. 1356, pp.1-13, 2008.7
  7. J.Y. Kim, J.Y. Choi, W.S. Lee, "Optical Internet technology", Telecommunications Technology Association, TTA Journal, No.108, pp.124-131. 2006.12.
  8. K.H. Kim, Y.S. Jang, J.H. Yang, S.Y. Ha, A Study of Security Network Architecture based on Back-born Network of Korea Information Infrastructure, Proceedings of the Korea Society for internet information Conference, Vol. 5, No. 2, pp.131-134, 2004.1.
  9. P.H. Park, AhnLab Homepage, "DDoS attack prevention practices", http://www.ahnlab.com, 2009.7.
  10. S.T. Jeong, D.S. Goo, D.H. Yang, J.Y. Hwang, S.D. Kim, P.J. Kim, Development of optical loss-tester for WDM optical communication, Ministry of Information and Communication, 2004.5.31.
  11. T. S. Kim, H.N. Yoon, H. S. Lee, Design and Implementation of Attack Detect/traceback System on All-IP Network, Proceedings of the Korea Society for internet information Conference, pp.11-14, 2009.10.
  12. Y.S. Eom, C.B. Lee, Network Intrusion Detection System Using Packet Inspection Method for Response of Distributed Denial of Service. Proceedings of the Korean Institute of Communication Sciences Conference, pp.604-607, 2003.11
  13. Y.S. Kim, D.Y. Kim, Study ont the establishment of an efficient disadter emergency communcation system focused on the site, Journal of the Korea Society of Disaster Information, Vol. 10, Np. 4, pp.518-528, 2014 https://doi.org/10.15683/kosdi.2014.10.4.518
  14. National Information Security White Paper 2015, National Intelligence Service, 2015.5
  15. National Information White Paper. 2014, National Information Society Agency, 2014
  16. DOI:http://www.hrfco.go.kr/web/sumunPage/district.do
  17. DOI:http://rhms.river.go.kr/WebForms/sub_03/sub_03_01_07.aspx
  18. DOI:http://www.wamis.go.kr/main/usrdt_src.aspx