• Title/Summary/Keyword: 네트워크 보안 인프라

Search Result 220, Processing Time 0.023 seconds

Access Control Mechanism based on MAC for Cloud Convergence (클라우드 융합을 위한 MAC 정책 기반 접근통제 메커니즘)

  • Choi, Eun-Bok;Lee, Sang-Joon
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.1
    • /
    • pp.1-8
    • /
    • 2016
  • Cloud computing technology offers function that share each other computer resource, software and infra structure based on network. Virtualization is a very useful technology for operation efficiency of enterprise's server and reducing cost, but it can be target of new security threat when it is used without considering security. This paper proposes access control mechanism based on MAC(Mandatory Access Control) for cloud convergence that solve various problem that can occur in cloud environment. This mechanism is composed of set of state rules, security characteristics and algorithm. Also, we prove that the machine system with access control mechanism and an initial secure state is a secure system. This policy module of mechanism is expected to not only provide the maintenance but also provide secure resource sharing between virtual machines.

A Study on the Improvement of Security Enhancement for ZTNA (보안성 강화를 위한 ZTNA운영 개선방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.21-26
    • /
    • 2024
  • The security model in the previous network environment has a vulnerability in which resource access control for trusted users is not properly achieved using the Perimeter model based on trust. The Zero Trust is an absolute principle to assume that the users and devices accessing internal data have nothing to trust. Applying the Zero Trust principle is very successful in reducing the attack surface of an organization, and by using the Zero Trust, it is possible to minimize damage when an attack occurs by limiting the intrusion to one small area through segmentation. ZTNA is a major technology that enables organizations to implement Zero Trust security, and similar to Software Defined Boundary (SDP), ZTNA hides most of its infrastructure and services, establishing one-to-one encrypted connections between devices and the resources they need. In this study, we review the functions and requirements that become the principles of the ZTNA architecture, and also study the security requirements and additional considerations according to the construction and operation of the ZTNA solution.

New ODS Retrieval Service in the Mobile RFID Environment (모바일 RFID 환경에서 개선된 ODS 검색 서비스)

  • Oh, Jeong-Jin;Koh, Hyung-Dae;Choi, Han-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.12
    • /
    • pp.45-52
    • /
    • 2008
  • The Object Directory Service(ODS) of the mobile RFID is the core technology of the object information service for the object information retrieval among objects with RFID tags. The ODS service returns an URL information of a specific object application service after recognizing the mRFID tag in real time. The general ODS service is suitable for the global mRFID environment, but it is not good in the local networks and private networks that information security is needed. This paper proposes a new ODS service algorithm for the improvement of the general ODS service algorithm.

XMPP-based Vehicle messaging System for Collaboration and Contents Sharing (협업 및 콘텐츠 공유를 위한 XMPP기반 차량용 메시징 시스템)

  • Jung, Hun;Park, HaeWoo;KU, Jahyo
    • Journal of the Korea society of information convergence
    • /
    • v.5 no.2
    • /
    • pp.67-76
    • /
    • 2012
  • XML-based open protocol, XMPP users to pass messages to other users, which means that a decentralized communication network is the network infrastructure and enable it. In addition, XMPP servers using a professional server-to-server protocol to communicate with each other and decentralized social networks and collaboration framework provides an important possibility. In this paper, the features of XMPP messaging protocol is applicable to automotive telematics terminals XMPP-based platform design, and presence of two-way communication point for the problem, point-to-point session setup issues, security issues, compatibility issues, and to solve the scalability problem XMPP-based messaging system was implemented.

  • PDF

Design and implementation of blockchain-based anti-theft protocol in Lora environment (Lora 환경에서 블록체인 기반 도난방지 프로토콜 설계 및 구현)

  • Park, Jung-oh
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.1-8
    • /
    • 2022
  • With the development of communication infrastructure, the number of network equipment owned by one person is gradually increasing. General-purpose devices such as smartphones can implement theft/loss prevention function by implementing S/W. However, other small devices lack practicality such as long-distance communication problems due to standard communication technology specifications or H/W limitations, and lack of functions(authentication and security). This study combines the Lora communication protocol in the LPWA standard environment and the blockchain technology. Anti-theft and security functions were added to the protocol, and the PBFT consensus algorithm was applied to build a blockchain network. As a result of the test, the effectiveness of safety(authentication and trust network) and performance(blockchain processing performance) were confirmed. This study aims to contribute to the future development of portable or small device anti-theft products as a 4th industrial convergence research.

A Study on the Convergence of Monitoring and Control System with Geographic Information System (지리정보시스템과 관제시스템의 융합에 관한 연구)

  • Seo, Tae-Woong;Kim, Chang-Soo;Lee, Jae-Sung;Lee, Cheol-Won
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.5
    • /
    • pp.703-709
    • /
    • 2011
  • State-based infrastructure on IT-based network are prone to numerous cyber attack including subsequent hacking and internet infringement. These acts of terrorism are increasing because of the expanding IT convergence technology. Recently, the trend on cyber security monitoring and control researches focus on combining the general idea of security monitoring and control along with IT field and other control systems. This convergence trend has been increasing in both the use and importance. This research analyzes the state-based infrastructure monitoring and control system, its vulnerability as well as its improvement by incorporating the cyber convergence systems to existing systems. The subject of this research is for extensive use of CCTV systems which is expanded for 'CCTV Monitoring and Control Field' as well as 'Traffic Monitoring and Control Field' operated by 'Intelligent Traffic Information System' and Disaster Management Area which is studied in various fields. Eventually, the objective of the paper is to solve these issues, to apply related systems and to suggest improvement on the convergence system.

Data Origin Authentication Scheme for Wireless Mesh Networks (무선 메쉬 네트워크를 위한 데이터 송신 인증 기술)

  • Kang, Nam-Hi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.7
    • /
    • pp.135-142
    • /
    • 2010
  • Wireless mesh network, which is an access network technology, adopts ubiquitous features of ad-hoc network that includes capabilities of self-configuration and self-management. This paper proposes a scheme which enables nodes along route in wireless mesh network to authenticate data and verify data integrity. The scheme distinguishes infra-node, which is a network device used to form mesh network, and user node in ad-hoc network, which operates functions as a sender, receiver or relayer, to deploy different authentication scheme. That is, hop-based authentication scheme along route forming wireless backbone differs from authentication scheme for user nodes in route over MANET. The proposed scheme is less complex than previously proposed schemes from the repects of security setup procedures and managements. In addition, the scheme is able to reduce transmission delay from a source to a destination owing to fast authentication over wireless backbone.

Analysis of Trouble Ticket System for Efficient Network Management (효율적인 통신망 관리를 위한 TTS 시스템 분석 및 설계)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.9-10
    • /
    • 2007
  • Recently, as infra structure on network is being extended, its reliability and availability have an important effect upon the productivity of the entire organization, the subject of economy. If an temporary trouble on network(hardware, protocol) which serve as pipeline of information tendency is occurred, the organization is suffered serious damage. thus, more effective counterplan is required to safely manage network. TTS(Trouble Ticket System) is needed to clear away every obstacle. eventually, TTS can minimize the loss of time and money. In this paper, it will make use of the development of TTS suitting with domestic situation.

  • PDF

Study on Intrusion Detection System under Cloud Computing Environment (클라우드 컴퓨팅 환경을 위한 침입탐지시스템 특징 분석)

  • Yang, Hwan-Seok;Lee, Byoung-Cheon;Yoo, Seung-Jea
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.59-65
    • /
    • 2012
  • Clouding computing which is developing newly as IT and network technology develops become changed to internet and service environment of company. Especially, it can lend IT resource at low costs and no need to build up infra. Clouding computing environment become popular more and more because various computing environment using virtualization is provided. The attack threat range also becomes wider in proportion to broaden various connection ways and service supply range at these clouding computing. Therefore, intrusion detection system which can protect resource from various attack having malignant attempts is necessary. In this study, we analyzed about characteristic of intrusion detection system at cloud computing environment having big damage than other computing environment when intrusion happen by sharing of resource and virtualization.

Home Gateway-based Home Network Access Control Mechanism (홈게이트웨이 기반 홈네트워크 접근제어 메커니즘)

  • Kim Geon-Woo;Kim Do-Woo;Lee Jun-Ho;Hwang Jin-Beon;Han Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.733-736
    • /
    • 2006
  • As various mobile technologies, sensor technologies, remote control and network infrastructure are developing and expectations on quality of life are increasing, a lot of researches and developments on home network technologies and services are actively on going. Until now, home network is just beginning, and we are developing home network services necessary to users, incrementing easiness, however we need to research on the safety of home network system guaranteeing the easiness as the services are going actively. So, in this paper, we propose the access control mechanism for protecting the home network system against indoor/outdoor illegal accesses and unauthorized accesses.

  • PDF