• Title/Summary/Keyword: 실시간 보안관리

Search Result 325, Processing Time 0.024 seconds

A study on the Efficient OKTEK(One-way Key-chain for TEK) for Realtime Digital Contents Transmission (실시간 디지털 콘텐츠 데이터 전송을 위한 효율적인 OKTEK(One-way Key-chain for TEK) 기법에 관한 연구)

  • Jeon, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.3
    • /
    • pp.103-111
    • /
    • 2009
  • IEEE 802.16e(Wibro) standard, providing robust mobile realtime data transmission technology, requires of faster and smooth execution of security mechanisms, such as key distribution and user authentications, during base station hopping. In particular, key management mechanisms such as redistribution and regeneration have an impact on digital contents transmission and realtime data transmission, not only in 802.16e environment, but also in typical transmission environment as well. This paper presents traffic management mechanisms designed to realtime digital contents (such as IPTV) transmission efficiency and increase the QoE by utilizing OKTEK methodology.

Design of Real-time Disaster Safety management Solution in a Smart Environment (스마트 환경에서의 실시간 재난 안전 관리 솔루션 설계)

  • Seo, Ssang-Hee;Kim, Bong-Hyun
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.31-36
    • /
    • 2020
  • In recent years, increasing the variety of disasters and accidents that accompany large-scale damage. Disasters are accidents with uncertainty and have a direct impact on people's lives, safety and property protection. Therefore, it is necessary to establish and operate safety management systems such as prevention, response, and recovery for various disasters. Therefore, in this paper, a real-time disaster safety management solution in a smart environment was designed to systematically respond to disaster accidents. To this end, 1: 1 or 1: N situation propagation was performed to the situation room, related organizations, and experts through smart devices. Through this, the solution was configured to respond quickly and appropriately through multi-party information sharing and communication. In other words, we designed a solution that applied functions such as real-time and multi-party HD video transmission, mobile-type report management, voice / text situation propagation, location information sharing, recording and history management, and security.

Development of DApp for Management Driving Route Information of Autonomous Vehicle (자율주행 자동차의 주행 경로 정보 관리를 위한 DApp 개발)

  • Jun-Won Kim;Nam-Hyeon Kim;Jung-Kyu Shin;Bo-Hyeon Kim;Gyu-Min Jeong;Jung-Hyun Woo;Kwang-Man Ko
    • Annual Conference of KIPS
    • /
    • 2023.11a
    • /
    • pp.229-229
    • /
    • 2023
  • 블록체인은 보안성과 탈중앙화를 동시에 제공하는 자료구조 중 하나로, 데이터를 중앙 서버가 아닌 모든 참여자들이 동등한 위치에서 관리할 수 있기 때문에 데이터를 투명하고 신뢰성 있게 관리할 수 있다. 본 연구에서는 자율주행 자동차의 차량정보, 주행 중 생성되는 데이터를 블록체인에 저장하여 차량상태, 차량경로 등을 실시간으로 모니터링할 수 있으며 생성 데이터의 권리 보장, 보안성 강화를 위한 이더리움기반 Dapp을 개발한다.

Design and Implementation of Security Kernel Module with Additional Password for Enhancing Administrator Authentication (관리자 인증 강화를 위한 추가적인 패스워드를 가지는 보안 커널모듈 설계 및 구현)

  • Kim, Ik-Su;Kim, Myung-Ho
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.675-682
    • /
    • 2003
  • Attackers collect vulnerabilities of a target computer system to intrude into it. And using several attack methods, they acquire root privilege. They steal and alter information in the computer system, or destroy the computer sysem. So far many intrusion detection systems and firewallshave been developed, but recently attackers go round these systems and intrude into a computer system . In this paper, we propose security kernel module to prevent attackers having acquired root privilege from doing illegal behaviors. It enhances administrator authentication with additional password, so prevents attackers from doing illegal behaviors such as modification of important files and installation of rootkits. It sends warning mail about sttacker's illegal behaviors to administrators by real time. So using information in the mail, they can estabilish new security policies.

Digital Signature Mechanism by Mobile Agent Security Model of Distributed Web Environment (분산 웹 환경에서 이동 에이전트 보안 모델에 의한 전자서명 메카니즘)

  • Choi, Kil-Hwan;Shin, Min-Hwa;Bae, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.787-792
    • /
    • 2003
  • Telecommunication network are becomming bigger and more complex. Its difficult to manage efficiently the networks, because these networks usually have heterogeneous and inompatoble compinents. Nevertheless, current approaches to network management have focused on centralized managementstrategies based on client-server architecture. These approaches have resulted in much weakness in the real-time management, the service extensibility, and the network scalability. In thispaper, we applied the mobile agent technology to solve the above problems. Jave is a promising technology for developing mobile agent system. But, there are several problems like the service extensibility in using the Java. To solve these problems, a new approach using digital signature is suggested to authenticate mobile agent in network management environments. This approach can solve the conflict between security of the system and extensibility of the mobile code. Moreover, the system suggested in this paper show the decentralized and flexible network management solutions.

Design of Web-Based Home Gateway Management System using SSL (SSL을 이용한 웹 기반 홈 게이트웨이 관리 시스템의 설계)

  • 황태인;박광로;윤병우;조강홍;정진욱
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.189-198
    • /
    • 2002
  • In this paper, we have designed the Web_based Home Gateway Management System using SSL, which can manage subscribers using Home Gateway device in home networking technology. To manage Home Gateway devices with SNMP, management elements are classified into system. performance. fault functional area based on MIB objects from Home Gateway devices MIB. System analysis provides configuration information of each Home Gateway, and Performance analysis provides device's traffic information and state. And fault analysis provides fault logging for the unexpected events and trap message from devices. HGMS uses SSL (Secure Socket Layer) to enforce the security of communication which is between server and client, and it improved the stability of HGMS.

  • PDF

Comparison of SIEM Solutions for Network Security (네트워크 보안을 위한 SIEM 솔루션 비교 분석)

  • Lee, Jong-Hwa;Bang, Jiwon;Kim, Jong-Wouk;Choi, Mi-Jung
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.11-19
    • /
    • 2019
  • As technology develops, the latest security threats on the network applied to users are increasing. By attacking industrial or corporate systems with malicious purposes, hackers cause many social problems such as confidential information leakage, cyber terrorism, infringement of information assets, and financial damage. Due to the complex and diversified threats, the current security personnel alone are not enough to detect and analyze all threats. In particular, the Supervisory Control And Data Acquisition (SCADA) used in industrial infrastructures that collect, analyze, and return static data 24 hours a day, 265 days a year, is very vulnerable to real-time security threats. This paper introduces security information and event management (SIEM), a powerful integrated security management system that can monitor the state of the system in real time and detect security threats. Next, we compare SIEM solutions from various companies with the open source SIEM (OSSIM) from AlienVault, which is distributed as an open source, and present cases using the OSSIM and how to utilize it.

시스템 보안을 위한 가상화 기술 활용 동향

  • Kim, In-Hyuk;Kim, Tae-Hyoung;Kim, Jung-Han;Lim, Byoung-Hong;Eom, Young-Ik
    • Review of KIISC
    • /
    • v.19 no.2
    • /
    • pp.26-34
    • /
    • 2009
  • 가상화 기술은 소프트웨어적으로 독립된 가상환경을 제공함으로써 관리 수단 통합, 자원 활용 극대화, 안정된 서비스 제공 및 비용 절감 등 많은 이점을 부여하며 다양하게 활용되고 있다. 가상화를 적극적으로 활용하고 있는 분야로는 서버 가상화, 실시간 시스템, 시스템 모니터링, 클라우드 컴퓨팅 등을 대표적으로 꼽을 수 있으며, 시스템 보안 분야에서도 가상화의 이점을 적용하여 한층 높아진 보안 서비스를 제공하고 있다. 이러한 동향에 따라 본 논문에서는 먼저 가상화 기술에 대해 전반적으로 살펴보고, 이를 기반으로 시스템 보안 분야에서 가상화 기술이 어떻게 활용되고 있는지 알아본다.

A Design and Implementation of Loadable Kernel Module for Enhanced Security on Linux System (리눅스 시스템의 보안 강화를 위한 LKM(Loadable Kernel Module) 설계 및 구현)

  • Kim, Ik-Su;Kim, Myung-Ho
    • Annual Conference of KIPS
    • /
    • 2002.11b
    • /
    • pp.933-936
    • /
    • 2002
  • 공격자는 시스템에 침입하기 위해 취약점을 수집하며 여러 공격방법을 통해 루트권한을 획득하게 된다. 루트권한을 획득한 공격자는 공격 시스템에 루트킷을 설치하여 침입에 대한 흔적을 숨기고 차후 침입을 위한 백도어를 남기게 되는데 최근 등장한 커널 기반의 루트킷은 시스템에 대한 침입 탐지를 어렵게 하고 있다. 이러한 공격에 대응하기 위해 침입탐지 및 차단을 위한 보안 시스템들이 많이 개발되어 왔지만 공격자들은 보안 시스템들을 우회하여 시스템에 침입하고 있다. 본 논문에서는 루트권한을 획득한 공격자의 불법행위를 막기 위해 시스템 보안 강화 LKM을 설계, 구현하며 중요 파일의 변조와 루트킷의 실치를 막고 공격자의 불법행위를 관리자에게 실시간으로 알릴 수 있는 방법을 제안한다.

  • PDF

A security implementation based on the sensor tag (센서 태그를 이용한 보안 장치 구현)

  • Kim, Sang-Choon;Park, Ji-Mann
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.19-24
    • /
    • 2011
  • This paper describes a passive SID sensor tag that provide physical security functions based on a sensor interface module. It elementarily consists of a serial I/O interface, control module, and sensor module. In this paper, it show tamper-proof security functions by comparison and encryption with the sensor signal data using the physical resistors. The passive SID sensor tag can be realized by the real time management for the safety, forgery, and so on. The proposed SID tag embedded with a sensor module is expected to find wide physical security applications.