• Title/Summary/Keyword: 공격방지

Search Result 629, Processing Time 0.026 seconds

A Study on the Countermeasure of Traffic Terror (대중교통테러의 대응방안)

  • Kim, Jin-Hyeok
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.109-123
    • /
    • 2007
  • Traffic terror is one of the terror types subject on transportation means. However, unlike the aircraft or ship, there is no case of negotiating with passengers as hostage but to unconditionally attack that the human casualty would be much greater. In act, the terror on subway or bus would have much bigger damage than the terror on aircraft or ship. Because of such fact, there is a need for full preparation thereto, however, there is no preparation of advance preventive measure, particularly, when comparing to the cases involving aircraft. In addition, the passengers who use railway and others in the position of citizens do not have any defense mechanism against any terror activity to make the problem even more serious. Therefore, in order to prevent traffic terror, the first thing is to implement the identity confirmation of passengers, followed by the through search of cargos of the passengers, supplement the capability against the terror by the security team members, strengthen the responsive capability of citizens, thorough check on facilities, expansion of social security network and others. All terrors are within the reach of our neighborhood at the time when we neglect it, and the most secured and safe way to prevent the terror is to check and prepare at all times beginning from our familiar facilities or means.

  • PDF

Digital Watermarking using Bit Concealment in Wavelet Transform Domain (웨이브렛 영역에서의 비트 은닉을 이용한 디지털워터마킹)

  • Sung, Kwang-Jin;Kim, Min-Tae;Lee, Jong-Hyuck;Jee, Inn-Ho;Ahn, Hong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.1-8
    • /
    • 2008
  • The object of watermarking is to prevent from copying and distributing without the copyright or right of ownership. In case of using watermark as an image data we can detect watermark whether an original image exists or not. In this paper, we proposed that an image data is used for watermark and the watermark is detected without an original image. After the original image is transformed with DWT and the watermark is transformed with DCT, they are transformed with binary number. We calculate an optimal bit position for concealing watermark of an original binary image and insert the watermark and determine the best position for robustness against JPEG compression, filtering, and resampling attacks within inserted watermark image. In this paper, we are able to confirm the right of copyright and ownership easily while using invisible watermark and also we can detect a watermark without an original image.

  • PDF

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration (디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.

Analysis on Development Methodology of Modern Secure boot: Focusing on Platform Environment (현대의 보안부팅 개발 방식 분석: 플랫폼 환경을 중심으로)

  • Kim, Jin-Woo;Lee, Sang-Gil;Lee, Jeong-Guk;Lee, Sang-Han;Shin, Dong-Woo;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.2
    • /
    • pp.15-26
    • /
    • 2020
  • Secure boot is security technology that verifies the integrity of the computer system in boot stage and controls the boot process accordingly. The computer system can establish a secure execution environment from the threat of various malwares by security boot and also supports the recovery when system in emergency case. Recently, Secure boot has been adopted by various modern computer manufacturers to protect users' information from hacker attacks and to prevent abuse of their products by malicious users. In this paper, we classify security boot developed by various companies and organizations by platform, and analyze the design and development purpose of each security boot and investigate the limitation of design. It can be used as a reference for system security designers in various information of security boot development method and security design of system.

A Development Technique for Application Software Based on Intrusion Tolerant Requirements (침입감내 요구사항을 수용한 응용 소프트웨어 개발)

  • Kim Chul Jin;Lee Sook Hee;Cho Eun Sook
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.2
    • /
    • pp.233-248
    • /
    • 2005
  • An intrusion tolerant technology has been introduced as a solution to prevent intrusion accident for unknown fragility or attack. However, a systematic modeling technique is not applied into a system design and development based on intrusion tolerant technology. Especially, elements such as availability, integrity, reliability, confidentiality, and so on are important requirements in intrusion tolerant system. Nevertheless, current most of UML-based modeling techniques pass over or don't provide design techniques reflecting those requirements. Therefore, we know these weaknesses and propose both profile and design technique reflecting and applying intrusion tolerant requirements systematically in the development of application software based on intrusion tolerance. We expect that proposed technique can extend not only current UML's limitations but also can improve the quality of application software based on intrusion tolerance.

  • PDF

Security Enhancing of Authentication Protocol for Hash Based RFID Tag (해쉬 기반 RFID 태그를 위한 인증 프로토콜의 보안성 향상)

  • Jeon, Jin-Oh;Kang, Min-Sup
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.23-32
    • /
    • 2010
  • In this paper, we first propose the security enhancing of authentication protocol for Hash based RFID tag, and then a digital Codec for RFID tag is designed based on the proposed authentication protocol. The protocol is based on a three-way challenge response authentication protocol between the tags and a back-end server. In order to realize a secure cryptographic authentication mechanism, we modify three types of the protocol packets which defined in the ISO/IEC 18000-3 standard. Thus active attacks such as the Man-in-the-middle and Replay attacks can be easily protected. In order to verify effectiveness of the proposed protocol, a digital Codec for RFID tag is designed using Verilog HDL, and also synthesized using Synopsys Design Compiler with Hynix $0.25\;{\mu}m$ standard-cell library. Through security analysis and comparison result, we will show that the proposed scheme has better performance in user data confidentiality, tag anonymity, Man-in-the-middle attack prevention, replay attack, forgery resistance and location tracking.

Design of A Generic and Scalable DRM Scheme using HC-256 Stream Cipher (HC-256 스트림 암호화를 이용한 범용성 및 확장성을 가진 DRM 기법 설계)

  • Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.923-930
    • /
    • 2009
  • Digital Rights Management(DRM) is a term that refers technologies for imposing limitations on the use of digital content for protecting media copyright holders. This paper proposes a generic scheme for digital media copy protection that can be applied to any digital media such as audio, video, etc. The scheme will make it very hard to play a copied content on a foreign platform and to guess secret content encryption keys. Unlike other DRM techniques, the scheme uses the stream cipher HC-256 only for encrypting media content and it allows a client to start content playback immediately following its streamed decryption. As to the encryption, it requires to generate several secret keys for each new client(player copy), rather than for each media content, which makes it scalable in terms of managed keys. Also, for simplicity, the scheme supports the popular unlimited-play-after-download policy only, which would eliminate the necessity for deploying separate server or process for licensing.

Internal Network Partition Security Model Based Authentication using BlockChain Management Server in Cloud Environment (클라우드 환경에서 블록체인관리서버를 이용한 인증기반 내부망 분리 보안 모델)

  • Kim, Young Soo;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.434-442
    • /
    • 2018
  • Recently, the threat to the security and damage of important data leaked by devices of intranet infected by malicious code through the Internet have been increasing. Therefore, the partitioned intranet model that blocks access to the server for business use by implementing authentication of devices connected to the intranet is required. For this, logical net partition with the VDI(Virtual Desktop Infrastructure) method is no information exchange between physical devices connected to the intranet and the virtual device so that it could prevent data leakage and improve security but it is vulnerable to the attack to expose internal data, which has access to the server for business connecting a nonregistered device into the intranet. In order to protect the server for business, we suggest a blockchain based network partition model applying blockchain technology to VDI. It contributes to decrease in threat to expose internal data by improving not only capability to verify forgery of devices, which is the vulnerability of the VDI based logical net partition, but also the integrity of the devices.

The Study on Secure Mail Platform and Mutual Authentication Using Mail Proxy (메일 프락시를 통한 사용자 상호인증 방법과 안전한 메일 플랫폼에 대한 연구)

  • Ahn, Hyo-Beom;Lee, Su-Yeon
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.201-208
    • /
    • 2016
  • The purpose of Email system is used to transmit important information between companies in today. But Email system has vulnerabilities such that changing email address of sender by attacker. So it is important to authenticate mail server and user using mail server. This paper proposed mail proxy located between mail servers that evaluate authority and authenticate sender and receiver. The proposed email platform has some functions to compose trusted domain and to authenticate mail servers in the domain. Also, if sender and recipient are valid users in mail system, each exchanges a key for confidentiality and the sender sends an e-mail encrypted with exchanged key to recipient. In this paper, we propose a key exchange scheme in proposed platform and verify this protocol using Casper which is the formal analysis tool. In the future research, we will study the overall platform of the domain configuration for the security of mail.

Vector Data Hashing Using Line Curve Curvature (라인 곡선 곡률 기반의 벡터 데이터 해싱)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2C
    • /
    • pp.65-77
    • /
    • 2011
  • With the rapid expansion of application fields of vector data model such as CAD design drawing and GIS digital map, the security technique for vector data model has been issued. This paper presents the vector data hashing for the authentication and copy protection of vector data model. The proposed hashing groups polylines in main layers of a vector data model and generates the group coefficients by the line curve curvatures of the first and second type of all poly lines. Then we calculate the feature coefficients by projecting the group coefficients onto the random pattern and generate finally the binary hash from the binarization of the feature coefficients. From experimental results using a number of CAD drawings and GIS digital maps, we verified that the proposed hashing has the robustness against various attacks and the uniqueness and security by the random key.