• Title/Summary/Keyword: 불법 침입

Search Result 127, Processing Time 0.03 seconds

심층탐구 / 네트웍보안

  • Jeong, Yeong-Jo
    • Digital Contents
    • /
    • no.11 s.90
    • /
    • pp.62-73
    • /
    • 2000
  • 인터넷은 거대한 통신 인프라로 자리잡았다. 하지만 이를 사용하는데 있어 역작용 또한 많이 존재하고 있다. 특히 인터넷이 Business의 한 장으로 이용되기 위해서는 사용상의 안전성의 확보가 필요하다. 인터넷을 사용하므로 생길 수 있는 위협요소를 살펴보면 다음과 같다. 인터넷의 기반 프로토콜인 TCP/IP는 다른 네트웍 프로토콜에 비해 일반적으로 많이 알려져 있으며 사용하는 방법에 따른 여러가지 위험요소를 가지고 있다. 이러한 위험요소는 크게 '메시제도청 및 변조'. '메시지위조 및 행위부인'.'서비스거부공격','시스템불법침입','악성코드' 등으로 분류할수 있다.

  • PDF

정보보호제품의 적합성 시험 평가 현황

  • 김상춘;권혁찬;나재훈;손승원;정교일
    • Review of KIISC
    • /
    • v.11 no.2
    • /
    • pp.7-15
    • /
    • 2001
  • 정보통신의 발전으로 유익한 정보를 쉽게 공유할 수 있는 환경이 조성되었으나, 각종 정보에 대한 불법적 침입, 공 격 등의 위협이 날로 증가하고 있다. 이에 대응하기 위해 많은 정보보호 제품이 개발되고 있으며, 이러한 제품의 성 능, 신뢰도를 평가하기 위한 방안도 최근 많이 제안되고 사용되고 있다. 특히 최근들어 정보보호 제품들이 관련 표준 규격에 적합하게 개발되었는지를 시험하는 적합성 시험에 대한 요구와 연구가 급증하는 실정이다. 본 고에서는 현재 사용되는 정보보호 제품의 평가 체계와 정보보호제품의 적합성 시험 평가 현황을 분석하였다.

  • PDF

정보보호 표준화 항목 정의 및 로드맵

  • 오흥룡;오세순;김선;염흥열
    • Review of KIISC
    • /
    • v.15 no.5
    • /
    • pp.67-82
    • /
    • 2005
  • 정보보호기술은 인터넷 등의 컴퓨터 통신망을 통하여 전달되거나 정보시스템에 저장되어 있는 정보에 대한 위조, 변조, 유출, 무단침입 등을 비롯한 각종 불법 행위로부터 조직 혹은 개인의 컴퓨터와 정보를 안전하게 보호하는 기술을 지칭하며, 이들은 무결성, 기밀성, 가용성 서비스를 통하여 실현된다. 본 논문에서는 정보보호 일반 기술중에서 암호 및 인증 기술, 네트워크 보안 기술, 응용 보안 기술, 고리고 평가 및 인증체계 기술 등에 대한 표준화 동향을 파악하고, 이를 근거로 표준화 항목을 정의하고 표준화 추진체계 등을 고찰해 본다.

A Development of Central Policy Database for managing Heterogeneous Firewall Systems (이종의 침입 차단시스템 관리를 위한 중앙 정책 데이터베이스 개발)

  • Lee, Dong-Young;Chung, Tai-Myoung
    • The KIPS Transactions:PartD
    • /
    • v.9D no.6
    • /
    • pp.1063-1070
    • /
    • 2002
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from intrusions and attacks, many vendors have developed various security systems such as firewalls and intrusion detection systems. However, managing these systems individually demands too much work and high cost. Thus, integrated and autonomous security management for various security products has become more important. In this paper, we present the architecture of the WISMSF (Web-based Integrated Security Management System for Firewalls) and the merits of centralized approach for managing heterogeneous firewalls and implement the prototype of the central policy database that is a component of the WISMSF engine. The WISMSF engine supports an integrated view for policies, the integrity of polities and the easy recovery and addition of policies. And also, we define the policy conflicts of WISMSF and present the policy recovery process to support to the policies consistence.

A Government Agency Environment Protects Information System Design using Intrusion Prevention System and Role-Base Security Policy (침입방지시스템과 역할기반 보안정책을 이용한 정부기관 정보보호 시스템 설계)

  • Ahn Joung Choul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.91-103
    • /
    • 2004
  • The survey of network firewall system has been focused on the deny policy that protects information from the unlicensed and the intrusion detection system. Government has solved several firewall problems as building the intranet separated from the intranet. However, the new firewall system would been satisfied both the denialpolicy and information share with the public, according as government recently emphasizes electronic service. Namely, it has to provide the functions such as the information exchange among divisions, partial share of information with the public, network connection and the interception of illegal access. Also, it considers the solution that protects system from hacking by inner user and damage of virus such as Worm. This Paper suggests the protects information system using the intrusion prevention system and role-based security policy to support the partial opennessand the security that satisfied information share among governments and public service.

A Development of Web-based Integrated Security Management System for Firewalls (웹 기반의 방화벽 통합 보안 관리 시스템 개발)

  • Lee, Dong-Young;Kim, Dong-Soo;Hong, Seung-Sun;Chung, Tai-Myoung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3171-3181
    • /
    • 2000
  • With a remarkable growth and expansionof Internet, the security issues emerged from intrusions and attacks such as computer viruses, dental of servives and backings to destroy intormation have been considered as serious threats for Internet and the provate networks. To protect networks from those attacks, many nendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However managing those systems individually requres too much work and high cost. Thus, integrated security managemanet and eatabliashment of consistent security policy for various security products has become more important. In this paper, we propose integrated security manabement system called WISMSF(Web based Integrated Security Management System for Fireswalls) to monitor and contro various kinds of firewalls WISMSF consists of three components-clients, integrated engine, and agents. It supports the transparent management functions of security products, easy ways of defining security policies, and simple expansion of managed ranges.

  • PDF

Design and Implementation of a System to Detect Intrusion and Generate Detection Rule against Scan-based Internet Worms (스캔 기반의 인터넷 웜 공격 탐지 및 탐지룰 생성 시스템 설계 및 구현)

  • Kim Ik-Su;Jo Hyuk;Kim Myung Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.191-200
    • /
    • 2005
  • The brilliant achievements in computers and the internet technology make it easy for users to get useful information. But at the same time, the damages caused by intrusions and denial of service attacks are getting more worse. Specially because denial of service attacks by internet worm incapacitate computers and networks, we should draw up a disposal plan against it. So far many rule-based intrusion detection systems have been developed, but these have the limits of these ability to detect new internet worms. In this paper, we propose a system to detect intrusion and generate detection rule against scan-based internet worm, paying attention to the fact that internet worms scan network to infect hosts. The system detects internet worms using detection rule. And if it detects traffic causing by a new scan-based internet worm, it generates new detection nile using traffic information that is gathered. Therefore it can response to new internet worms early. Because the system gathers packet payload, when it is being necessary only, it can reduce system's overhead and disk space that is required.

The Analysis of The Jaming Effectiveness according to Anti-Drone Detection Distance (안티드론 탐지 거리에 따른 재밍의 영향성 분석)

  • Hong, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.664-666
    • /
    • 2021
  • Anti-drone means a device that detects and blocks the intrusion and activity of illegal drones, and includes technology that crashes illegal drones or destroys them in the air. This paper analyzes the impact of jamming due to remote drone detection with anti-drone technology. The impact of jamming signals may vary depending on the distance of the drone. The present invention has an advantage of simultaneously jamming a drone at a short distance and a drone at a long distance due to the generation of a triangular wave, and efficiently operates a battery by not transmitting the drone at a maximum power.Also, even if the jamming is not affected at a distance, the jamming effect is greater at a close range, so it can be influenced differently.

  • PDF

Network based Anomaly Intrusion Detection using Bayesian Network Techniques (네트워크 서비스별 이상 탐지를 위한 베이지안 네트워크 기법의 정상 행위 프로파일링)

  • Cha ByungRae;Park KyoungWoo;Seo JaeHyun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.27-38
    • /
    • 2005
  • Recently, the rapidly development of computing environments and the spread of Internet make possible to obtain and use of information easily. Immediately, by opposition function the Hacker's unlawful intrusion and threats rise for network environments as time goes on. Specially, the internet consists of Unix and TCP/IP had many vulnerability. the security techniques of authentication and access controls cannot adequate to solve security problem, thus IDS developed with 2nd defence line. In this paper, intrusion detection method using Bayesian Networks estimated probability values of behavior contexts based on Bayes theory. The contexts of behaviors or events represents Bayesian Networks of graphic types. We profiled concisely normal behaviors using behavior context. And this method be able to detect new intrusions or modificated intrusions. We had simulation using DARPA 2000 Intrusion Data.

  • PDF

A Study of Hierarchical Policy Model of Policy-based Integrated Security Management for managing Heterogeneous Security Systems (이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구)

  • Lee, Dong-Yeong;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.607-614
    • /
    • 2001
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from those attacks, many vendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However, managing those systems individually requires too much work and high cost. Thus, in order to manage integrated security management and establish consistent security management for various security products, the policy model of PN-ISMS (Policy Based Integrated Security Management System) has become very important. In this paper, present the hierarchical policy model which explore the refinement of high-level/conceptual policies into a number of more specific policies to form a policy hierarchy. A formal method of policy description was used as the basis of the mode in order to achieve precision and generality. Z-Notation was chosen for this propose. The Z-Notation is mathematical notation for expressing and communicating the specifications of computer programs. Z uses conventional notations of logic and set theory organized into expressions called schemas.

  • PDF