• Title/Summary/Keyword: 네트웍보안

Search Result 74, Processing Time 0.025 seconds

Alert Data Processing for heterogeneous Intrusion Detection Systems in Secure Network Framework (보안네트워크 프레임워크에서 이기종의 침입 탐지 시스템 연동을 위한 경보데이터 처리)

  • Park, Sang-Kil;Kim, Jin-Oh;Jang, Jong-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2169-2172
    • /
    • 2003
  • 네트웍을 이용한 외부의 침입을 탐지하기 위해 침입탐지시스템이 1980년대부터 연구되었다. 침입탐지 시스템은 침입을 발견하면 경보데이터나 로그데이터를 생성하는데 서로 상이한 데이터 집합으로 인해 별도의 데이터 매핑이 필요한 문제점을 해결하고자 IETF 의 침입탐지 관련 그룹인 IDWG 에서 IDMEF를 제안하였다. 본 논문에서는 이러한 IDMEF 형식을 지원하는 경보데이터 구조를 설계하고, 이를 통하여 상위의 보안제어서버에서 상이한 침입탐지 시스템으로부터의 경보데이터를 저장, 관리할 수 있는 방법을 제공한다 이러한 기본적인 경보데이터 관리 이외에 저장된 경보데이터를 통한 공격자 정보 추출, 피해 호스트 정보 추출등의 부가적인 방법 또한 제공한다.

  • PDF

Authentication Mechanism Implementation for Information Sharing in Peer-to-Peer Environment (Peer-to-Peer 환경에서의 정보 공유를 위한 인증 메커니즘 구현)

  • Lee, Jeong-Ki;Bae, Il-Ho;Lee, Cheol-Seung;Moon, Jung-Hwan;Park, Chan-Mo;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.7
    • /
    • pp.1120-1125
    • /
    • 2002
  • According as progress by information society, computer network use and enlargement of scale are accelerated more. Also, with good physician increase of information that is exchanged through computer network, security of network is embossed to controversial point that is new. Because P2P as that remove or weakens center server function is open network that can participate between each user, problem about authentication between each users is risen. If certain user in network i3 in open environment, this user must authenticate request about service to user who is admitted between each user to limit connection. This treatise proposed method to keep security in P2P environment to solve this and designed certification mechanism that quote Kerberos certification mechanism to mechanism that can share information safety in P2P environment.

Proxy-Based Scalable Server Access Management Framework Using Reverse Webshell Protocol (웹쉘 기술을 통한 프록시 기반의 확장 가능한 서버 관리 프레임워크)

  • Daeun Kim;Sangwook Bae;Seongmin Kim;Eunyoung Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.661-670
    • /
    • 2023
  • With the emergence of serverless computing paradigm and the innovations of cloud technology, the structure of backend server infrastructure has evolved from on-premises to container-based serverless computing. However, an access control on the server still heavily relies on the traditional SSH protocol, which poses limitations in terms of security and scalability. This hampers user convenience and productivity in managing server infrastructure. A web shell is an interface that allows easy access to servers and execution of commands from any device with a web browser. While hackers often use it to exploit vulnerabilities in servers, we pay attention to the high portability of web shell technology for server management. This study proposes a novel proxy-based server management framework utilizing web shell technology. Our evaluation demonstrates that the proposed framework addresses the drawbacks of SSH without additional overhead, and efficiently operates large-scale infrastructures in diverse computing environments.

A Study on Secure Kerberos Authentication using Trusted Authority in Network Structure (네트웍 환경에서 안전한 Kerberos 인증 메커니즘에 관한 연구)

  • 신광철;정진욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.123-133
    • /
    • 2002
  • In Network Environment, Kerberos certification mechanism to require Kerberos server in other area unconditionally belief. Also, Kerberos server in cooperation area must be share server of other area and secret key. To solve these two problems, this paper proposed safe security mechanism of doing to ably IETF CAT's PKINIT/PKCROSS a1gorithm with Public Key Infrastructure and use Directory System and service between realms do trust and prove each Kerberos trust center base. Also, Although Kerberos server of each area must be foreknowing each server's secret key and public key, Obtain through Trust center and acquire each area's public key and common symmetric key, Application server excluded process that must register key in Key Distribution Center.

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.

A Study on Streaming Service for Content Protection (컨텐츠 보호를 위한 스트리밍 서비스 방안 연구)

  • 박지현;윤기송;전경표
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.198-201
    • /
    • 2003
  • Changes in internet and network environment make it possible to provide high-quality content services in real time. As demand for digital content is increased, problems related to intellectual property rights are getting more important. Streaming service like video-on-demand solved this problem by preventing content from being saved. But, as the advent of several tools able to save streamed content, the streamed content is not free from these problems any more. So, with security countermeasure like access control, new technologies to control and manage rights for content are needed. One of the solutions is DRM In this paper, we describe a DRM-based streaming service that can send the ASF stream which is the multimedia file format of Microsoft.

  • PDF

Light-weight System Design & Implementation for Wireless Intrusion Detection System (무선랜 침입탐지를 위한 경량 시스템 설계 및 구현)

  • Kim, Han-Kil;Kim, Su-Jin;Lee, Hwan-Kyu;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.602-608
    • /
    • 2014
  • Smartphones have become commonplace to use smart, BYOD (Bring Your Own Device) spread the trend of domestic WLAN use is intensifying as a result, the security threat will be greatly increased. Even though WLAN vendors such as Cisco Systems Inc,. Aruba networks released WIPS, MDM, DLP etc, however, these solutions can not be easily introduced for small business due to high cost or administrative reasons. In this paper, without the introduction of expensive H/W equipment, in WLAN environments, packet analysis, AP, Station management, security vulnerabilities can be analyzed by the proposed intrusion detection system.

A Study on policy of packet dropping for enhancing IDS performance (침입탐지시스템의 성능 향상을 위한 패킷 폐기 방안에 대한 연구)

  • Moon, Jong-Wook;Yim, Kang-Bin;Kim, Jong-Su;Jung, Gi-Hyun;Choi, Kyung-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1509-1512
    • /
    • 2001
  • 인터넷의 급속한 성장과 함께 보안이 사회적인 이슈가 됨에 따라 침입 탐지 시스템이 크게 각광을 받게 되었다. 하지만 이러한 침입 탐지 시스템의 대부분이 범용 하드웨어와 범용 운영 체제를 기반으로 하기때문에 본질적으로 패킷 수집의 성능이 떨어질 뿐 아니라 침입을 탐지하기 위한 비용도 너무나 커서 과도한 패킷이 유입될 때 제대로 처리를 못 하게 된다. 본 논문에서는 이러한 침입 탐지 시스템의 성능에 대한 문제점 개선을 위해서 네트웍 부하의 감소가 보장되고 불법 침입도 유해정보도 아닌 내부 서버의 실제 웹 컨텐트를 담은 패킷의 폐기를 제안하고 실험을 통해서 제안 방안의 가능성을 보인다.

  • PDF

The study on blocking virus and harmful information through firewalls (방화벽에서 바이러스 및 불건전정보 차단에 관한 연구)

  • Song, Eui;Kwon, Seok-Chul;Kim, Nam-Wook;Lee, Byung-Man;Song, Kwan-Ho
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1996.11a
    • /
    • pp.185-189
    • /
    • 1996
  • 외부의 불법 침입자로부터 내부 네트웍 보안을 위한 하나의 솔루션으로 방화벽이 제공되고 있다. 방화벽은 크게 패킷필터링 방식과 어플리케이션 방식의 방화벽으로 나누어지는데 어플리케이션방식은 프락시 기능을 이용한다. 본 논문에서는 어플리케이션 방식의 방화벽에서 FTP Proxy, SMTP Proxy를 통한 파일전송시 바이러스 차단 및 HTTP Proxy를 통한 음란, 폭력물과 같은 불건전정보를 차단하는 방법을 제시하였다.

  • PDF

Development of home networking application using WIPI platform (WIPI 플랫폼을 이용한 홈네트웍 어플리케이션 개발)

  • 강훈철;좌정우
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.323-329
    • /
    • 2004
  • New business model for mobile internet has been developed using multifunction mobile terminal. Multifunction terminal provides mobile multimedia service such as VOD and AOD and personal area network(PAN) service using bluetooth and W-LAN. In this paper, we develop home network WEI application interworking with home network gateway This application controls home appliances and provides still image for home secuirt using the web camera. We further develop the home networking PAN services using multifunction terminal having GigBee and RFID.

  • PDF