• Title/Summary/Keyword: 보안평가 모델

Search Result 322, Processing Time 0.023 seconds

Performance Evaluation of LAN with Security Services (보안 서비스를 적용한 LAN의 성능 평가)

  • 김회림
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.1
    • /
    • pp.25-38
    • /
    • 1996
  • LAN 의 사용이 증가하면서 정보의 정확성과 전달 속도뿐만 아니라 신뢰성이 점점 더 중요해짐에 따라 보안 서비스를 LAN 에 적용하는 것이 필요하게 되었다. 그러나, 정보 보호를 위해 보안 서비스를 적용하여 정보를 LAN 을 통해 교환할 경우 메시지 전달 지연 시간이 길어지고, LAN 의 처리량에도 영향을 미치게 된다. 따라서 적용되는 암호 시스템과 전체 정보량에서의 암호화 정보량이 LAN 의 성능에 미치는 영향을 미리 예측하는 것이 중요하다. 본 논문에서는 이와 같은 필요성에 의해 보안 서비스를 LAN 상에 적용할 수 있는 방법을 제시하기 위해서 Ethernet, Token Ring, FDDI 를 사용하였고, DES, Knaspsack, RSA와 같은 암호 시스템을 적용하였다. 이와 같은 다양한 LAN 환경과 그에 적용할 암호 시스템을 선택하여 교체 적용함으로서 여러 가지 다른 조건의 환경에서의 성능을 평가할 수 있는 보안 서비스가 적용된 LAN 의 시뮬레이션 모델을 개발하였다. 또한 이러한 시뮬레이션 모델을 이용하여 보안 서비스를 LAN 에 적용했을 때의 성능을 평가하였다.

Developing A Quantitative Evaluation Model for Information System Security Auditing (정보시스템 보안감리평가의 정량화모델 개발)

  • Kim, Dong-Soo;Kim, Hyun-Soo
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2003.05a
    • /
    • pp.363-370
    • /
    • 2003
  • 지금까지 국내 보안감리 평가는 정성적인 평가에 머물러 있어 평가를 담당하는 감리인마다 평가 결과가 서로 상이하여 피 평가자에게 신뢰를 심어주지 못하는 결과가 초래되고 있다. 본 연구에서는 보안감리에 대한 국내의 연구와 해외 사례를 참조하여 SI사업에서의 보안감리평가 효율성을 제고할 수 있는 방안 및 평가체계를 정량화하는 방안을 제시하였다. 이를 위해 SI사업의 소프트웨어 개발 및 개발 환경(네트워크, 서버 등)을 중심으로 한국전산원에서 제시하고 있는 보안감리 지침과 한국정보시스템감리인협회의 보안관련 세부 감리지침을 통합하고 세부 감리지침에 따른 평가를 정량화 하였다. 보안감리 평가의 정량화 방안에 대한 감리전문가의 인터뷰와 사례 프로젝트의 적용을 통하여 연구 모형에 대한 검증을 실시하였다.

  • PDF

A Study on Models for Technical Security Maturity Level Based on SSE-CMM (SSE-CMM 기반 기술적 보안 성숙도 수준 측정 모델 연구)

  • Kim, Jeom Goo;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.25-31
    • /
    • 2012
  • The SSE-CMM model is how to verify the level of information protection as a process-centric information security products, systems and services to develop the ability to assess the organization's development. The CMM is a model for software developers the ability to assess the development of the entire organization, improving the model's maturity level measuring. However, this method of security engineering process improvement and the ability to asses s the individual rather than organizational level to evaluate the ability of the processes are stopped. In this research project based on their existing research information from the technical point of view is to define the maturity level of protection. How to diagnose an information security vulnerabilities, technical security system, verification, and implementation of technical security shall consist of diagnostic status. The proposed methodology, the scope of the work place and the current state of information systems at the level of vulnerability, status, information protection are implemented to assess the level of satisfaction and function. It is possible that measures to improve information security evaluation based on established reference model as a basis for improving information security by utilizing leverage.

A Distributed Communication Model and Performance Evaluation for Information Transfer in a Security Policy-based Intrusion Detection System (보안정책 기반 침입탐지시스템에서 정보 전달을 위한 분산 통신 모델과 성능 평가)

  • Jang Jung Sook;Jeon Yong Hee;Jang Jong Soo;Sohn Seung Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1707-1721
    • /
    • 2004
  • In this paper, we propose a distributed communication model of intrusion detection system(IDS) in which integrated security management at networks level is possible, model it at a security node and distributed system levels, design and implement a simulator. At the node level, we evaluate the transfer capability of alert message based on the analysis of giga-bit security node architecture which performs hardware-based intrusion detection. At the distributed system level, we perform the evaluation of transfer capability of detection and alert informations between components of distributed IDS. In the proposed model, we carry out the performance evaluation considering decision factors of communication mechanism and present the results in order to gain some quantitative understanding of the system.

Detection of Source Code Security Vulnerabilities Using code2vec Model (code2vec 모델을 활용한 소스 코드 보안 취약점 탐지)

  • Yang, Joon Hyuk;Mo, Ji Hwan;Hong, Sung Moon;Doh, Kyung-Goo
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.45-52
    • /
    • 2020
  • Traditional methods of detecting security vulnerabilities in source-code require a lot of time and effort. If there is good data, the issue could be solved by using the data with machine learning. Thus, this paper proposes a source-code vulnerability detection method based on machine learning. Our method employs the code2vec model that has been used to propose the names of methods, and uses as a data set, Juliet Test Suite that is a collection of common security vulnerabilities. The evaluation shows that our method has high precision of 97.3% and recall rates of 98.6%. And the result of detecting vulnerabilities in open source project shows hopeful potential. In addition, it is expected that further progress can be made through studies covering with vulnerabilities and languages not addressed here.

Development for Reliability Quality and Performance Evaluate Model of Fingerprint Recognition System (지문인식시스템의 신뢰성 품질 성능 평가모델 개발)

  • Eom, Woo-Sik;Jeon, In-Oh
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.79-87
    • /
    • 2011
  • Although products with the fingerprint recognition system currently show a rapid growth in quantity, it is also true that efforts to consider the product quality have been lacking until now. Accordingly, this paper analyzed technological elements with domestic and foreign market situations for products with the fingerprint recognition system to develop an evaluation model to support the quality increase by evaluating aspects of product quality for the knowledge information security, identifying the level of quality and deriving directions for improvements. A model for the reliability quality evaluation was constructed that can be applied comprehensively to non-functional elements that have not been done in the existing evaluations central to the security functions by analyzing requirements for the security, performance and reliability in consideration of features on products. It is considered that this paper can make contributions to the overall quality increase for products with the knowledge information security by reflecting features and trends for the fingerprint recognition products and building a model for the reliability and evaluation to perform evaluations by product.

Development of Security Quality Evaluate Basis and Measurement of Intrusion Prevention System (침입방지시스템의 보안성 품질 평가기준 및 측정체계의 개발)

  • Jeon, In-Oh;Kang, Sang-Won;Yang, Hae-Sool
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.4
    • /
    • pp.1449-1457
    • /
    • 2010
  • The intrusion prevention system solution is receiving the spotlight as the next generation security system. It is anticipated that the system will form a very active security market both domestically and overseas. Moreover, quality evaluation proving successful inspection of merchandises is required of domestic businesses seeking to operate in the international market, and general users also prefer those that have successfully passed inspection. This study has constructed a security quality evaluation model for intrusion prevention system by deriving and analyzing security quality evaluation items required by an intrusion prevention system solution and by classifying them in detail. The derived quality evaluation model will play an important role of assessing and improving the quality of intrusion prevention system.

A Study on Method for Network Security Measurement (네트워크 보안성 측정방법에 관한 연구)

  • Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.79-86
    • /
    • 2007
  • In recent, one of the interesting research areas is about quality of network system. Therefore many research centers including ISO are preparing the measuring and evaluating method for network quality. This study will represent an evaluating model for network security based on checklist. In addition, we propose an measuring and evaluating method for network performance. The purpose of two studies is to present the evaluating procedure and method for measuring security of network on set workwill be identified and a measuring method and procedure will be proposed.

  • PDF

VPN secure quality evaluation system development (가상사설망(VPN)시스템의 보안성 품질평가모델 개발)

  • Ma, Zhi-Zhong;Jin, Jin-Yu;Yang, Hae-Sool
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1331-1332
    • /
    • 2011
  • 가상사설망(VPN)시스템은 기존 사설망의 고비용과 비효율적인 관리를 해결하기 위해 인터넷망을 마치 전용선으로 사설망을 구출한 것처럼 개발한다. 본 연구에서는 ISO/IEC 9126과 ISO/IEC 25000를 기반을 둔 객관성 있는 품질평가 방법을 구축하고 가상사설망시스템 제품 고유의 보안특성을 접목한 품질평가 체계를 구축함으로써 객관성과 타당성을 갖춘 평가모델을 개발하였다.

Quantitative Cyber Security Scoring System Based on Risk Assessment Model (위험 평가 모델 기반의 정량적 사이버 보안 평가 체계)

  • Kim, Inkyung;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1179-1189
    • /
    • 2019
  • Cyber security evaluation is a series of processes that estimate the level of risk of assets and systems through asset analysis, threat analysis and vulnerability analysis and apply appropriate security measures. In order to prepare for increasing cyber attacks, systematic cyber security evaluation is required. Various indicators for measuring cyber security level such as CWSS and CVSS have been developed, but the quantitative method to apply appropriate security measures according to the risk priority through the standardized security evaluation result is insufficient. It is needed that an Scoring system taking into consideration the characteristics of the target assets, the applied environment, and the impact on the assets. In this paper, we propose a quantitative risk assessment model based on the analysis of existing cyber security scoring system and a method for quantification of assessment factors to apply to the established model. The level of qualitative attribute elements required for cyber security evaluation is expressed as a value through security requirement weight by AHP, threat influence, and vulnerability element applying probability. It is expected that the standardized cyber security evaluation system will be established by supplementing the limitations of the quantitative method of applying the statistical data through the proposed method.