• Title/Summary/Keyword: 보안망

Search Result 1,161, Processing Time 0.026 seconds

VPN implementation using expanded NAT on Embedded Linux (임베이디드 리눅스에서의 확장된 NAT를 이용한 VPN구현)

  • 이정재;채현석;최명렬
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.688-690
    • /
    • 2002
  • 최근 인터넷의 성장과 함께 인터넷을 이용한 사설망인 VPN의 필요성이 커지고 있다. 본 논문에서는 확장된 NAT 기능을 이용한 VPN 기능을 임베이드 리눅스 환경에서 구현하여 기존 VPN의 단점을 보완하고 VPN 장비의 크기를 최소화 할 수 있도록 한다. 제안된 VPN 기능은 실제 인터넷 환경에 적용하기 쉬우며 보안 프로토콜이나 암호화 알고리즘을 생략하고도 강한 보안성을 제공하고, 기존의 공개망을 최대한 활용할 수 있어 그 활용가치가 높을 것으로 생각된다. 또한, 임베이드 시스템에서 VPN을 구현함으로써 장비의 소형화, 안정성 및 경제성을 실현하여 그 활용가치가 높을 것으로 생각된다.

  • PDF

Migration Using Reordering Recovery in Wired/Wireless Networks

  • Lee, Dong-Chun
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.115-121
    • /
    • 2007
  • Due on failures of communication nodes for the wireless and wired networks, mobile agents may be blocked even if there is available service in the networks. To solve it, we propose migration policy with reordering of the paths to guarantee the migration of mobile agents and the paper will provide the extension with the autonomous migration of mobile agents.

  • PDF

Analyses of Routing Protocol and Security in Mobile Ad Hoc Networks in Ubiquitous Surroundings (유비쿼터스 환경하에서의 이동 Ad Hoc Network의 라우팅 및 정보보안 분석)

  • Kim Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.191-194
    • /
    • 2006
  • 본 논문에서는 이동 통신망하에서의 Ad Hoc 네트워크에서의 프로토콜을 분석 비교하고, 유비쿼터스 환경하에서의 Ad Hoc 환경하에서의 정보보안 대책을 분석하고자 한다. 이러한 분석을 통하여 차세대 멀티미디오통신하에서의 유선망과 이동망과의 정보를 교환할 대 발생할 수 있는 데이터의 정보를 보호 할 수 있는 알고리즘과 프로토콜을 제안하고 분석한다.

  • PDF

A Secure Authentication Mechanism using PKI in Ad Hoc Networks (Ad hoc 네트워크에서 공개키 기반구조를 이용한 신뢰적인 인증 메커니즘)

  • 봉진숙;윤미연;신용태
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.436-438
    • /
    • 2004
  • 이동 ad-hoc 네트워크(mobile ad-hoc network : MANET)는 유선 기반 망 흑은 액세스 포인트 없이 이동 단말기들로 구성된 망이다. 기존의 기반망을 사용하지 않으므로 유선 기반망이 구축되어 있지 않은 곳이나 유선 기반망이 파괴된 지역에 사용한다. 그러나 HANET에서는 노출된 매체와 동적인 토폴로지, 중앙의 감시와 관리 결여, 자원의 제약성 등과 같은 이유로 인해 유선망보다 더욱 않은 보안 문제가 발생한다. 본 논문에서는 이동 ad hoc 네트워크에서 노드의 신분 보장을 제공하기 위하여 기밀성에 중점을 둔 공개키 기반 구조에서의 노드 간 인증 기법을 제안한다.

  • PDF

Designing an evaluation model for cyber security management system implementation for companies participating in the automobile supply chain (based on ISO/SAE 21434 standard and TISAX assessment requirements) (자동차 공급망 참여기업 대상 사이버보안 관리체계 구현 평가모델설계 (ISO/SAE 21434 표준 및 TISAX 평가 요구사항을 기반으로))

  • Baek Eun Ho
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.49-59
    • /
    • 2022
  • Cyber security in the automobile sector is a key factor in the life cycle of automobiles, and cyber security evaluation standards are being strengthened worldwide. In addition, not only manufacturers who design and produce automobiles, but also due to the nature of automobiles consisting of complex components and various parts, the safety of cybersecurity can be secured only when the implementation level of the cybersecurity management system of companies participating in the entire supply chain is evaluated and managed. In this study, I analyzed the requirements of ISO/SAE 21434 and TISAX, which are representative standards for evaluating automotive cybersecurity. Through a survey conducted on domestic/overseas company security officers and related experts, suitability and feasibility were reviewed according to priorities and industries, so 6 areas and 45 evaluation criteria were derived and presented as final evaluation items. This study is meaningful as a study in that it presented a model that allows companies participating in the automotive supply chain to evaluate the current cybersecurity management level of the company by first applying ISO/SAE 21434 and TISAX overall control processes before uniformly introducing them.

Traffic Analysis Architecture for Secure Industrial Control System (안전한 제어시스템 환경을 위한 트래픽 분석망 설계)

  • Lee, Eun-Ji;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1223-1234
    • /
    • 2016
  • The Industrial control system is adopted by various industry field and national infrastructure, therefore if it received cyber attack, the serious security problems can be occured in the public sector. For this reason, security requirements of the industrial control system have been proposed, in accordance with the security guidelines of the electronic control system, and it is operated by separate from the external and the internal network. Nevertheless, cyber attack by malware (such as Stuxnet) targeting to control system have been occurred continuously, and also the real-time detection of untrusted traffic is very difficult because there are some difficulty of keeping up with quickly evolving the advent of new-variant malicious codes. In this paper, we propose the traffic analysis architecture for providing secure industrial control system based on the analyzed the security threats, the security requirements, and our proposed architecture.

A Study on the Analysis and Classification of Cyber Threats Accor ding to the Characteristics of Computer Network of National·Public Organizations (국가·공공기관 전산망 특성에 따른 사이버 위협 분석 및 분류에 관한 연구)

  • Kim, Minsu;Park, Ki Tae;Kim, Jongmin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.197-208
    • /
    • 2020
  • Based on the network infrastructure advanced in the information knowledge society, the structure of computer net work is operated by establishing the composition of network in various forms that have secured the security. In case of computer network of national/public organizations, it is necessary to establish the technical and managerial securit y environment even considering the characteristics of each organization and connected organizations. For this, the im portance of basic researches for cyber training by analyzing the technical/managerial vulnerability and cyber threats based on the classification and map of cyber threats according to the characteristics of each organization is rising. T hus, this study aims to analyze each type of external/internal cyber threats to computer network of national/public o rganizations established based on the dualistic infrastructure network of internet and national information network, a nd also to present the cyber threat framework for drawing the elements of cyber security training, by drawing and analyzing the actual elements of cyber threats through the case-based scenario.

A study on ways to strengthen the new security system through the stipulation of zero trust : legal improvement under the Electronic Financial Transactions Act (제로 트러스트 명문화를 통한 신 보안체계 강화 방안 연구 - 전자금융거래법상 법적 개선을 중심으로 -)

  • Min-won Lee;Hun-yeong Kwon
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.9-17
    • /
    • 2023
  • Due to COVID-19, the concept of Zero Trust, a safe security in a non-face-to-face environment due to telecomm uting, is drawing attention. U.S. President Biden emphasized the introduction of Zero Trust in an executive order to improve national cybersecurity in May 2021, and Zero Trust is a global trend. However, the most difficulty in introd ucing new technologies such as Zero Trust in Korea is excessive regulation of cloud and network separation, which is based on the boundary security model, but is limited to not reflecting all new information protection controls due to non-face-to-face environments. In particular, in order for the government's policy to ease network separation to b ecome an effective policy, the zero trust name culture is essential. Therefore, this paper aims to study legal improve ments that reflect the concept of zero trust under the Electronic Financial Transactions Act.

A Study on Zero Trust Establishment Plan for Korean Military (한국군 맞춤형 제로 트러스트(Zero Trust) 구축방안 연구)

  • Kyuyong Shin;Chongkyung Kil;Keungsik Choi;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.131-139
    • /
    • 2023
  • In recent years, there have been frequent incidents of invasion of national defense networks by insiders. This trend can be said to disprove that the physical network separation policy currently applied by the Korea Ministry of National Defense can no longer guarantee military cyber security. Therefore, stronger cybersecurity measures are needed. In this regard, Zero Trust with a philosophy of never trusting and always verifying is emerging as a new alternative security paradigm. This paper analyzes the zero trust establishment trends currently being pursued by the US Department of Defense, and based on the implications derived from this, proposes a zero trust establishment plan tailored to the Korean military. The zero trust establishment plan tailored to the Korean military proposed in this paper includes a zero trust establishment strategy, a plan to organize a dedicated organization and secure budget, and a plan to secure zero trust establishment technology. Compared to cyber security based on the existing physical network separation policy, it has several advantages in terms of cyber security.

홈네트워크 보안 관련 기술

  • 전용희
    • Information and Communications Magazine
    • /
    • v.21 no.3
    • /
    • pp.81-95
    • /
    • 2004
  • 기간 망을 위한 훌륭한 네트워크 인프라로부터 가입자 망, 홈 네트워크에 이르기까지 초고속 인터넷 서비스 환경을 위한 요구가 변하고 있다. 이에 따라 정보통신부에서는 홈 네트워크 산업을 신성장 동력 산업 중의 하나로 선정하였으며, 관련 산업의 집중 육성에 대한 기대가 커지고 있다.(중략)