• Title/Summary/Keyword: 방어시스템

Search Result 691, Processing Time 0.025 seconds

A Study on Methodology for Standardized Platform Design to Build Network Security Infrastructure (네트워크 보안 인프라 구성을 위한 표준화된 플랫폼 디자인 방법론에 관한 연구)

  • Seo, Woo-Seok;Park, Jae-Pyo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.1
    • /
    • pp.203-211
    • /
    • 2012
  • Network security infrastructure is constantly developing based on the combination and blending of various types of devices. From the form of distributed control, the phased defense policy such as fire walls, virtual private communication network, invasion prevention system, invasion detection system, corporate security management, and TSM (Telebiometrics System Mechanism), now it consolidates security devices and solutions to be developed to the step of concentration and artificial intelligence. Therefore, this article suggests network security infrastructure design types concentrating security devices and solutions as platform types and provides network security infrastructure design selecting methodology, the foundational data to standardize platform design according to each situation so as to propose methodology that can realize and build the design which is readily applied and realized in the field and also can minimize the problems by controlling the interferences from invasion.

Enhanced Diffie-Hellman Key Distribution using Mobile-phone (이동전화기를 이용한 Diffie-Hellman 키 교환기법의 개선방안)

  • Lee, Yoon-Jin;Lee, Jae-Guen;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.12
    • /
    • pp.2563-2568
    • /
    • 2009
  • Although a symmetric cryptographic system has many advantages in speed of encryption decryption, the security problems with the distribution method of secret keys have been still raised. Especially, the distribution method of secret keys for unspecified individuals who want secret communication is becoming a core issue. As a simple solution to this issue, Diffie-Hellman key exchange methods were proposed, but proved to be insufficient in depending MITM(Main In The Middle) attacks. To find effective solution to problems mentioned above, this paper proposes the strengthened Diffie-Hellman key exchange methods applied for the mobile-phone channel which are widely used. This paper emphasizes the way to distribute the synthesized session keys to the sender and the receiver, which are created with authentication numbers exchanged between the mobile-phones and Diffie-Hellman key. Using proposed ways, MITMattacks can be effectively defended.

A Study of Real Time Security Cooperation System Regarding Hacker's Attack (해커의 공격에 대한 실시간 보안공조시스템 연구)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.285-288
    • /
    • 2010
  • Chinese hackers hack the e-commerce site by bypass South Korea IP to connect to the third country, finance damaging a violation incident that fake account. 7.7.DDoS attack was the case of a hacker attack that paralyzed the country's main site. In this paper, the analysis is about vulnerabilities that breaches by hackers and DDoS attacks. Hacker's attacks and attacks on the sign of correlation analysis is share the risk rating for in real time, Red, Orange, Yellow, Green. Create a blacklist of hackers and real-time attack will be studied security and air conditioning systems that attacks and defend. By studying generate forensic data and confirmed in court as evidence of accountability through IP traceback and detection about packet after Incident, contribute to the national incident response and development of forensic techniques.

  • PDF

A Numerical Analysis on the Thermal Protection System Applied Phase Change Material (상변화물질을 이용한 열방어체계의 수치해석 연구)

  • Oh, Chang-Mook;Yoo, Yung-Joon;Min, Seong-Ki
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.16 no.4
    • /
    • pp.80-86
    • /
    • 2012
  • This study is for figuring out a possibility of realization of the thermal protection system(TPS) for temporary use under high temperature condition and improving a design of the future TPS. On this purpose, environmental condition of the system has been simplified: the boundary conditions consist of a internally heating surface and a externally heated surface which is simulating the external high temperature condition. Configuration of the system is simplified as a hexahedon. Melting characteristics of the phase change material(PCM) and air temperature variation of TPS with or without connector have been numerically analyzed and compared. As a result of numerical analysis, the heat from the internally heated surface could not be effectively transferred. Therefore, temperature of inner space has been increased.

A Reverse Simulation for Developing Defense Systems based on Simulation Models (시뮬레이션 모델기반 국방체계 설계를 위한 역방향 시뮬레이션)

  • Choi, Seon Han;Kim, Tag Gon;Jin, Ki Byung;Park, Kyung Tae;Shin, Dong Cho
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.3
    • /
    • pp.27-40
    • /
    • 2020
  • When analyzing the effectiveness of a defense system in a virtual battlefield with a simulation model is referred to as forward simulation, reverse simulation is required to design a good defense system with high effectiveness. That is, using the simulation model, it is necessary to find the engineering factors, measures of performance, and operational tactics that are demanded to achieve high effectiveness of the system. However, the efficiency of reverse simulation is still a concern since many replications of forward simulation are required for conducting reverse simulation. In this paper, we introduce various efficient algorithms to reduce the number of replications and a reverse simulation tool for utilizing these algorithms easily. The tool allows practitioners to easily and efficiently conduct reverse simulation for design a good defense system based on simulation models. This is demonstrated with the case studies on the design of warship's defense system and the design of military network system.

A Strong RFID Authentication Protocol Based on Synchronized Secret Information (비밀정보 동기화에 기반한 Strong RFID 인증)

  • Ha, Jae-Cheol;Ha, Jung-Hoon;Park, Jea-Hoon;Moon, Sang-Jae;Kim, Hwan-Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.99-109
    • /
    • 2007
  • Lee et al. recently proposed an RFID mutual authentication scheme based on synchronized secret information. However, we found that their protocol is vulnerable to a spoofing attack in which an adversary can impersonate a legal tag to the reader by sending a malicious random number. To remedy this vulnerability, we propose two RFID authentication protocols which are secure against all possible threats including backward and forward traceability. Furthermore, one of the two proposed protocols requires only three hash operations(but, $[m/2]{\cdot}2+3$ operations in resynchronization state, m is the number of tags) in the database to authenticate a tag, hence it is well suitable fur large scale RFID systems.

Cognitive Approach to Anti-Phishing and Anti-Pharming (피싱 및 파밍 방지를 위한 인지 기반의 접근 방법)

  • Kim, Ju-Hyun;Maeng, Young-Jae;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.113-124
    • /
    • 2009
  • Recently, lots of anti-phishing schemes have been developed. Several products identify phishing sites and show the results on the address bar of the internet browser, but they determine only by domain names or IP addresses. Although this kind of method is effective against recent DNS pharming attacks, there is still a possibility that hidden attacks which modifies HTML codes could incapacitate those anti-phishing programs. In this paper, the cognitive approach which compares images to decide phishing or pharming is presented, using system tray and balloon tips that are hard to fake with pop-ups or flash in order for users to compare pictures from connecting sites and system tray. It differs from an old method that a program analyzes IP or domains to judge if it is phishing or pharming, but observes if there were HTML code changing between plug-ins and a server.

Statistical Analysis of High-Order Power Analysis (고차 전력 분석에 대한 통계적 수식의 일반화)

  • Kim, Min-Su;Kim, Hee-Seok;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.27-37
    • /
    • 2011
  • dth-order power analysis can safely be defended by dth-order masking method. However, as the degree of applied masking method increases, it can significantly decrease effectiveness of cryptosystem. The existing statistical analysis on high-order power analysis contains only analysis on second power analysis. However, this means absent of safety standards when crypto engineers apply 3rd or more order masking. this absent of standards can lead to insignificant usage of masking method which can significantly decrease effectiveness of cryptosystem. In this dissertation, we have generalize statistical values on high-order power analysis to establish these standards. In other words, we have generalized the value of a correlation coefficient when calculation of high-order power analysis methods are performed. That is to say, it can greatly be used to indicate a degrees that can be applied on further usage of masking method.

Patient Information Transfer System Using OAuth 2.0 Delegation Token (OAuth 2.0 위임 Token을 이용한 환자정보 전달 시스템)

  • Park, Jungsoo;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1103-1113
    • /
    • 2020
  • Hospitals store and manage personal and health information through the electronic medical record (EMR). However, vulnerabilities and threats are increasing with the provision of various services for information sharing in hospitals. Therefore, in this paper, we propose a model to prevent personal information leakage due to the transmission of patient information in EMR. A method for granting permission to securely receive and transmit patient information from hospitals where patient medical records are stored is proposed using OAuth authorization tokens. A protocol was proposed to enable secure information delivery by applying and delivering the record access restrictions desired by the patient to the OAuth Token. OAuth Delegation Token can be delivered by writing the authority, scope, and time of destruction to view patient information.This prevents the illegal collection of patient information and prevents the leakage of personal information that may occur during the delivery process.

A Defense Mechanism Against Attacks on Files by Hiding Files (파일 은닉을 통한 파일 대상 공격 방어 기법)

  • Choi, Jione;Lee, Junghee;Lee, Gyuho;Yu, Jaegwan;Park, Aran
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.2
    • /
    • pp.1-10
    • /
    • 2022
  • Deception technology is an extended concept of honeypot, which detects, prevents or delays attacks by deceiving adversaries. It has been applied to various system components such as network ports, services, processes, system calls and database management systems. We can apply the same concept to attacks on files. A representative example of a file attack is ransomware. Ransomware is a type of malware that encrypts user files and ask for ransom to recover those files. Another example is the wiper attack, which erases all or target files of a system. In this paper we propose a defense mechanism against these kinds of attacks by hiding files. Compared to backup or virtualization techniques, the proposed method incurs less space and performance overheads.