• Title/Summary/Keyword: 망연계

Search Result 9, Processing Time 0.021 seconds

제어망 보안을 위한 일방향자료전달시스템의 송수신 에이전트 개발

  • O, Yeong-Cheol;Han, Mi-Ran;Sin, Yong-Tae;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.708-709
    • /
    • 2015
  • 최근 외부의 악의적인 공격으로부터 내부의 시스템을 보호하기 위하여 논리적, 물리적으로 망을 분리하고 있다. 하지만 사회공학적 해킹에는 물리적 망 분리도 취약할 수밖에 없다. 이러한 이유로 국가기반시설들을 담당하는 주요 기관들은 좀 더 안전한 네트워크 망을 구성할 필요가 있다. 따라서 본 논문에서는 일방향자료전달 시스템을 제안한다. 본 논문에서 제시한 일방향자료전달시스템은 제어시스템으로부터 업무망으로 전달되어지는 정보를 수신하여 처리하고, 업무망의 제어 정보는 송신되지 않도록 구성한다. 이 방식을 통해 어떠한 경우에도 외부로부터 내부의 제어망을 통해 기간시스템에 접근하는 것이 불가능하기 때문에 국가기반시설을 안전하게 보호할 수 있다.

  • PDF

Technical development of physical unidirectional data transfer using PI agent on power control system environment (발전제어시스템 환경에서 PI에이전트를 이용한 물리적 일방향자료연계 기술 구현)

  • Kim, Soo-Ho;Kim, Ji-Hee;Kim, Jin-Cheol
    • Annual Conference of KIPS
    • /
    • 2016.10a
    • /
    • pp.220-221
    • /
    • 2016
  • 전력제어시스템은 외부망으로부터 보호하기 위하여 망분리를 해야 하지만 부득이하게 외부망과 연결을 필요로한다. 이러한 이유때문에 망연계 구간에서 보안을 강화할 수 있는 다양한 보안솔루션들이 개발되고 있다. 이 논문에서는 제어시스템에서 사용하고 있는 PI시스템과 제어망으로의 접속을 원천적으로 차단하는 물리적 일방향자료전달시스템 연계를 위한 구성과 그에 따른 에이전트 구현방법을 소개한다.

Data Exchange System Based on Learned MAPE-K for a Secure Defense Big Data Framework (안전한 국방 빅데이터 프레임워크를 위한 Learned MAPE-K 기반 자료교환 시스템)

  • Cho, Jun-Ha;Yu, Jin-Yong;Kim, Young-Gab
    • Annual Conference of KIPS
    • /
    • 2022.05a
    • /
    • pp.173-175
    • /
    • 2022
  • 국방 각급 부대는 망연계 자료교환 시스템에 의해 인터넷과 국방망을 연계하여 데이터를 수집하고 있다. 또한, 안전한 국방 데이터수집과 빅데이터 환경조성을 위해 악성코드를 내재한 데이터들을 차단 및 분류하는 데이터 검열을 수행한다. 그러나 수집되는 데이터들이 새로운 악성코드를 내재할 경우, 현재 운용되고 있는 국방 시스템으로 식별하는 것이 불가능하여 외부로부터의 보안위협이 존재한다. 따라서 본 논문에서는 새로운 악성코드 위협에도 대응할 수 있는 Learned MAPE-K 기반 자료교환 시스템을 제안한다.

CSfC Network Security Architecture Analysis for the Assurance of Commercial Security Solutions in Defense Area (국방 상용보안제품 도입을 위한 CSfC(Commercial Solutions for Classified Program) 네트워크 보안 아키텍처 분석)

  • Lee, Yong-joon;Park, Se-joon;Park, Yeon-chool
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.91-97
    • /
    • 2021
  • The United States is responding to evolving cyberattacks through the Commercial Solutions for Classified Program (CSfC). Authorized safety evaluation and certification are being carried out so that US government agencies can quickly introduce civilian commercial security products into the national pavilion. Commercial security products registered in the CSfC process can be used by defense agencies through a rapid approval process. Defense agencies approve commercial security products without duplicate evaluation. Approved security products can reduce the time, cost, and cost of the approval process required to implement the defense information system. In this study, security control for 4 types of network security architecture MSC (Multi-Site Connectivity), MA (Mobile Access), Campus WLAN, and DAR (Data at Rest) proposed by the US National Security Agency (NSA) for introduction to national defense A detailed analysis was performed on the items.

Secure File Transfer Method and Forensic Readiness by converting file format in Network Segmentation Environment (망분리 환경에서 파일형식 변환을 통한 안전한 파일 전송 및 포렌식 준비도 구축 연구)

  • Han, Jaehyeok;Yoon, Youngin;Hur, Gimin;Lee, Jaeyeon;Choi, Jeongin;Hong, SeokJun;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.859-866
    • /
    • 2019
  • Cybersecurity attack targeting a specific user is rising in number, even enterprises are trying to strengthen their cybersecurity. Network segmentation environment where public network and private network are separated could block information coming from the outside, however, it is unable to control outside information for business efficiency and productivity. Even if enterprises try to enhance security policies and introduce the network segmentation system and a solution incorporating CDR technology to remove unnecessary data contained in files, it is still exposed to security threats. Therefore, we suggest a system that uses file format conversion to transmit a secure file in the network separation environment. The secure file is converted into an image file from a document, as it reflects attack patterns of inserting malicious code into the document file. Additionally, this paper proposes a system in the environment which functions that a document file can keep information for incident response, considering forensic readiness.

Public Data Network Services with an ISDN for a Developing Country (데이타통신 후발국을 위한 종합정보통신망에 의한 공중패킷교환망 구성)

  • 주성순;전경표;김영시
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.3
    • /
    • pp.451-461
    • /
    • 1994
  • For developing countries which are in infant state of data communication services or don`t have their own Packet Switched Public Data Network(PSPDN), we present the strategy to construct the public data communication network, which guarantees the easy diffusion of data communication services, agrees with trends of telecommunication technology, and maximizes the outcomes to investments. With analyzing the characteristics of telecommunication infrastructures and demands of data communication services in a developing country, we show that the introduction of ISDN is the best solution for constructing a public data network. We also suggest aggressive approach to realize the packet switching functions into ISDN switching system and the networking scenario consisting of three graceful steps, based on the evolution of network architectures. Finally we show that the TDX-10 ISDN switching system, which is designed especially for developing countries, is helpful to commence the data communication era.

  • PDF

A study on security requirements for Telecommuting in defense industry (방산업체 비대면(재택) 근무를 위한 보안 요구사항 연구)

  • Hwang Gue Sub;Yeon Seung Ryu
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.209-221
    • /
    • 2023
  • Due to the rapid spread of the COVID-19 virus in December 2019, the working environment was rapidly converted to telecommuting. However, since the defense industry is an organization that handles technology related to the military, the network separation policy is applied, so there are many restrictions on the application of telecommuting. Telecommuting is a global change and an urgent task considering the rapidly changing environment in the future. Currently, in order for defense companies to implement telecommuting, VPN, VDI, and network interlocking systems must be applied as essential elements. Eventually, some contact points will inevitably occur, which will increase security vulnerabilities, and strong security management is important. Therefore, in this paper, attack types are selected and threats are analyzed based on the attack tactics of the MITER ATT&CK Framework, which is periodically announced by MITER in the US to systematically detect and respond to cyber attacks. Then, by applying STRIDE threat modeling, security threats are classified and specific security requirements are presented.

The Effect of EU-ETS Introduction on the Determinants of Electricity Net Export Connected Power Grid in Europe (유럽의 탄소배출권 거래시장 도입에 따른 연결계통국가들의 전력 순수출 결정요인 변화 분석)

  • Yoon, Kyungsoo;Park, Changsoo;Cho, Sungbong
    • Environmental and Resource Economics Review
    • /
    • v.28 no.3
    • /
    • pp.385-413
    • /
    • 2019
  • This study examines the determinants of net export of electricity among 30 European countries sharing electricity grid during the period of 1990~2014 by separating the sample period before and after 2005 in which ETS was introduced in Europe. The empirical method used in this study is generalize least squared one considering both heterogeneous and serial correlation in the balanced panel data. According to the empirical results, after 2005 introducing the ETS, holing energy resources, concentrating only on few electricity generation resources, and nuclear electricity generation had played more important role in net export of electricity, while renewable energy had negative effect on net export of electricity and coal and gas generation have no effect on net export after introduction of ETS in Europe probably because of high environmental cost. The policy implication of the results would be that reconsidering each country's optimal generation mix strategy and its role in case freely trading electricity.