Browse > Article
http://dx.doi.org/10.5762/KAIS.2015.16.5.3462

A Study on Stabilizing a Network Security Zone Based on the Application of Logical Area to Communication Bandwidth  

Seo, Woo-Seok (The Security Headquarters, EASYCERTI Co., Ltd.)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.16, no.5, 2015 , pp. 3462-3468 More about this Journal
Abstract
Regarding countless network disorders or invasions happening nowadays from 2014 until 2015, illegal access intended to attack through the communication line provided by ISP (Internet Service Provider) appears to be the source of the problem. As a defensive way to prevent such network-based attacks, not only stabilization structures for network communication but various policies as well as physical security devices and solutions corresponding to those have been realized and established. Therefore, now is the time to gain foundational research data to secure network security sections by producing logical area on communication bandwidth or such, suggest tasks to expand the communication line which is another research topic in the network security market, and recognize the fact that the active communication bandwidth linkage paradigm using network communication bandwidth is needed as one of the areas that can realize physical security. Additionally, it is necessary to limit the data in the forms of organizing visible security structures into a certain range of physical information by re-dividing communication capacity being currently provided by telecommunicators into subdivided organizational areas and applying the logical virtualization of communication capacity in each of the areas divided. By proposing a network security section based on a logical field application in place of the existing physical structure, basic data that designs a stable physical network communication structure will be provided.
Keywords
Communication Bandwidth; Logical security; Secure area;
Citations & Related Records
Times Cited By KSCI : 7  (Citation Analysis)
연도 인용수 순위
1 H. J. Suh, "An Improved Algorithm of Distributed QoS in Real-time Networks", The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 7 No. 1, pp.53-60, 2012.   DOI
2 S. H. Hong, "Analysis of DDoS Attack and Countermeasure: Survey", Journal of digital convergence, Vol. 12 No. 1, pp.423-429, 2014.   DOI
3 S. H. Yoon, H. M. An, M. S. Kim, "Study on Classification Scheme for Multilateral and Hierarchical Traffic Identification", Korea Information Processing Society, Vol. 3 No. 2, pp.47-56, 2014.
4 Korea Internet & Security Agency, "3 March Incident Response Internet statistics", pp.141, 2014.
5 J. Y. Seo, M. J. Lee, "An Extened Virtual LAN System Deploying Multiple Route Servers", Korea Institute of Information Scientists and Engineers, Vol. 29 No. 2, pp.117-128, 2002.
6 H. D. Lee, H. T. Ha, H. C. Baek, C. G. Kim, S. B. Kim, "Efficient Detction and Defence Model against IP Spoofing Attack through Cooperation of Trusted Hosts", Journal of the Korea Institute of Information and Communication Engineering, Vol. 16 No. 12, pp.2649-2656, 2012. DOI: http://dx.doi.org/10.6109/jkiice.2012.16.12.2649   DOI
7 H. J. Lee, H. T. Lee, H. S. Shin, "A Study On Ubiquitous Sensor Network Technologies", The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 4 No. 1, pp.70-77, 2009.
8 Y. G. Bae, C. H. Yoon, G. J. Kim, "TCP Congestion Control of Transfer Rate-based in End-to-End Network Systems", The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 1 No. 2, pp.102-109, 2006.
9 S. Jung, M. J. Lee, "An Efficient Multipath Routing with Dynamic Load Balancing", Korea Institute of Information Scientists and Engineers, Vol. 28 No. 3, pp.406-416, 2001.
10 Y. H. Lee, S. J. Yoo, "The Construction of Logical, Physical Network Separation by Virtualization", Convergence security journal, Vol. 14 No. 2, pp.25-33, 2014.
11 J. W. Youn, J. H. Kim, J. Y. Shin, K. J. Kim, "A Design and Implementation of OTU4 Framer for 100G Ethernet", The journal of Korea Information and Communications Society, Vol. 36 No. 12, pp.1601-1610, 2011.   DOI