Browse > Article
http://dx.doi.org/10.13067/JKIECS.2017.12.5.737

A Study on WB(Water-Bubble) Based Highly Secure Flexible Network Section  

Seo, Woo-Seok (Dept. Security Consulting, Gyeonggi-do R&D laboratory)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.12, no.5, 2017 , pp. 737-746 More about this Journal
Abstract
In 2017, amid changes in the security market such as integrated security (IS) and convergence security (CS), a variety of security paradigms in terms of operation and management have been suggested. Rather than changing existing network infrastructure and bringing about fluid, multi-dimensional changes, these solutions and technologies focus entire security capacity on a primary protection, leading to network infrastructure suffering from unexpected inherent violations and problems in a continued manner. Therefore, it is time to propose and develop a flexible network section that can protect from attacks of similar pattern and concentrated traffic attacks by applying a new concept of WB (Water-Bubble) to network infrastructure and analyzing on the basis of experiment and installation. Methodology of the WB-based highly secure flexible network section proposed in this study is expected to provide materials for studies on how to achieve network section security taking into account three major limitations and security standards: fluidity, unpredictability, and non-area scalability by contact point ratio, by changing a network area predicted to be the final target of attack into resonant network section (area) with flexible area changes.
Keywords
Network Security; Logical Buffer Layer; Flexible Network;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 D. Kim, Y. Jeong, G. Yun, H. Yoo, S. Cho, G. Kim, J. Lee, H. Kim, T. Lee, J. Lim, and D. Won, "Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems," Korea Institute of Information Security and Cryptology, vol. 22 no. 5, 2012, pp. 1191-1204.
2 J. Ko, H. Kwak, J. Wang, H. Kwon, and K. Chung, "An Improved Signature Hashing Algorithm for High Performance Network Intrusion Prevention System," Korea Institute of Information Security and Cryptology, vol. 16C no. 4, 2009, pp. 449-460.
3 J. Hoon, "A Study on The Vulnerabilities and Problems of Security Program," J. of Convergence Security, vol. 12 no. 6, 2012, pp. 77-84.
4 Y. Lee, "A Design and Analysis of Multiple Intrusion Detection Model," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 6, 2016, pp. 619-626.   DOI
5 K. Kim, D. Wang, and S. Han, "Home Security System Based on IoT," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 8, 2016, pp. 743-750.   DOI
6 J. Shin, "Economic Analysis on Effects of Cyber Information Security in Korea: Focused on Estimation of National Loss," J. of the Korean Institute of Information Security and Cryptology, vol. 23 no. 1, 2013, pp. 89-96.   DOI
7 S. Paik, S. Kim, and H. Park, "Design and Implementation of Network Access Control for Security of Company Network," Journal of the Institute of Electronics Engineers of Korea, vol. 47, no. 12, 2010, pp. 90-96.
8 K. Kim, Y. Park, S. Ro, and B. Kim, "Design of Infringement Accidents Preventing System Using DNS Information Retrieval Integration Method," J. of the Korea Institute of Information and Communication Engineering, vol. 16 no. 9, 2012, pp. 1955-1962.   DOI
9 M. C. Park, Y. S. Park, Y. R. Choi, "A Study on the Active Traceback Scheme Responding to a Security Incident," J. of the Korea Society of Computer and Information, vol. 10, no. 1, 2005, pp. 27-34.