• Title/Summary/Keyword: 외부 정보 네트워크의 다양성

Search Result 83, Processing Time 0.032 seconds

A Study on Security Framework in Digital Home Environments (디지털홈 환경에서의 보안 프레임워크 연구)

  • 김도우;한종욱;주홍일;이윤경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.724-727
    • /
    • 2004
  • With the development of modem communication and networking technology, more and more computing and communication facilities, automation equipments, hone information appliances and different type of networking terminals come into home all over the world. The user can control information appliances in home environments. The home environment can communicate with the external network via phone line, wired LAN, wireless LAN, or mixed. However, home information appliances that are connected to the external network are under attack and need to be secured. So specifying suitable security requirements and policies for digital home environment is critical in hone networking environments. This paper analyzes the possible vulnerability to home network, and specifies the security requirements derived from the vulnerability analysis for digital home environment

  • PDF

An AAA Mechanism using ID-based Ticket offer Anonymity (익명성을 지원하는 ID기반 티켓을 이용한 AAA 메커니즘)

  • Moon, Jong-Sik;Paek, Chang-Hyun;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.87-98
    • /
    • 2007
  • AAA protocol is an information protection technology which systematically provides authentication, authorization and accounting function not only in the existing wire network but also in the rapidly developing wireless network, various services and protocol. Nowadays, standardization of the various application services is in progress with the purpose of AAA standardization fer the mobile user in the wireless network. And various researches are being conducted fur using AAA in the roaming service and mobile IPv6 network between heterogeneous networks. In this paper uses OTP and ID-based ticket for user authentication in the mobile device under the ubiquitous environment, and service is seamlessly provided even though the mobile device moves from the home network to the foreign network. In addition, with the ticket renewed from the foreign network, the overhead of the home authentication server can be reduced, and provides anonymity of service through the anonymity ID.

Design of Honeynet with separated port managing Honeypot on VM (가상머신에서의 포트 분리 관리 허니팟과 허니넷 설계)

  • 임인빈;최재호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.643-645
    • /
    • 2004
  • 네트워크가 복잡해지면서 다양한 형태의 위험에 노출된다. 일반적인 보안 솔루션으로 사용하는 방화벽(Firewall)이나 침입탐지시스템(IDS)은 허가받지 않은 외부의 접속이나 알려진 공격만을 차단하는 단순하고 수동적인 시스템이다. 이에 반해 허니팟은 웹서버와 같은 실제 Front-End 시스템과 유사하거나, 밀접한 관련을 갖고 직접적으로 반응하므로 신뢰성 높은 실시간 정보를 얻을 수 있어서 관리자가 다양한 위협에 능동적이고 효과적으로 대응할 수 있다. 실제로 웜이나 DRDoS(Distributed Reflection DoS)등 수분만에 네트워크를 점유하는 자동화 공격과 함께 시스템 구성 취약점을 파고들거나 계정 획득을 통한 DB서버 등의 Back-End 시스템에 대한 수동 공격이 혼재한다. 따라서 시스템 전반적인 관리의 중요성이 강조되고 있다. 본 논문에서는 그간의 실험결과를 바탕으로 가상 머신으로 허니팟을 구성하고 특성별로 포트를 분리하여 관리하는 허니넷을 제안하고자 한다 이를 통해 1) 유연한 보안 시스템 구성이 가능하고 2) 관리 효율이 높아지며 3) 하드웨어 도입 비용 절감을 통해 시스템의 TCO(Totai Cost of Ownership)를 감소시키는 효과를 기대할 수 있다.

  • PDF

Design of Cloud-based Sensor Data Acquisition System Using Kubernetes in Sensor Networks (센서 네트워크에서의 쿠버네티스를 활용한 클라우드 기반 센서 데이터 수집 시스템 설계)

  • Park, Soo-Yong;Moon, Ju-Hyeon;Park, Seul-Woo;Shin, Yong-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.168-171
    • /
    • 2019
  • 센서 네트워크는 스마트 시티와 같은 4차 산업혁명 분야의 핵심기술로 다양한 분야에 활용되고 있다. 기존의 센서 네트워크는 여러개의 센서 노드가 한 개의 싱크 노드를 통해 인터넷으로 데이터를 전달하였다. 그러나 과도한 트래픽 또는 외부적인 요인으로 인해 싱크 노드가 중지될 경우 그 싱크노드와 연결된 센서 노드로부터 데이터를 수집하지 못하는 단점을 가지고 있다. 제안하는 시스템은 도커를 사용하여 싱크노드를 컨테이너화 하고 쿠버네티스를 통해 중지된 컨테이너를 자동으로 재시작하여 시스템의 안정성을 높일 수 있다.

A Survey of Code Dissemination Mechanisms on Sensor Networks (센서 네트워크에서 코드분배 메커니즘에 대한 조사 연구)

  • Kim, Mi-Hui;Kim, Ji-Sun;Kim, Jee-Hyun;Lim, Ji-Young;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.4
    • /
    • pp.423-438
    • /
    • 2009
  • The sensor network is highlighted because it is one of the essentialbase networks in the ubiquitous computing realization. Researches for providing security and efficiency are being perfomed in the various isuues because of the characteristics of sensor nodes and sensor networks. Recently, code dissemination mechanism is recognized as an important research issue since sensor nodes are in the need of updating new software or the need of modifying bugs in dynamically. Generally lots of nodes are in the sensor networks and they are ramdomly deployed in hostile environments. Thus it is especially important that the code dissemination from the base station to nodes should be processed efficienctly and securely. In this paper, we check up the recent existing code dissemination mechanisms, and comparatively analyze the requirements of the code dissemination and the characteristicsof existing mechanisms. Through the analysis, we present future research issues for the code dissemination area. This research can expedite the research on the code dissemination and improve the usability of sensor networks with efficiency and security.

An empirical analysis of the influence of external knowledge network on SMEs' new technology development and technology commercialization capabilities in the perspective of open innovation (개방형 혁신의 관점에서 외부 지식네트워크가 중소기업의 신기술 개발 역량 및 기술 사업화 역량에 미치는 영향에 대한 실증분석)

  • Hau, Yong Sauk
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.149-156
    • /
    • 2016
  • In today's rapidly-changing business context with technology convergence among various fields, new technology development and technology commercialization capabilities are very important to the survival and growth of small and medium-sized enterprises (SMEs). This study develops the research model based on the open innovation perspective and empirically tests it by using 2,000 data from SMEs in South Korea. The empirical analysis result reveals that SMEs' external technology collaboration network and external information network diversities have positive effects on their technology commercialization capability, and these effects are fully mediated by their new technology development capability. Based on these results, the study provides meaningful implications especially in terms of SMEs' managers who pursue entrepreneurship.

A Privacy Protection Method in Social Networks Considering Structure and Content Information (소셜 네트워크에서 구조정보와 내용정보를 고려한 프라이버시 보호 기법)

  • Sung, Minh-Kyoung;Lee, Ki-Yong;Chung, Yon-Dohn
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.119-128
    • /
    • 2010
  • Recently, social network services are rapidly growing and it is estimated that this trend will continue in the future. Social network data can be published for various purposes such as statistical analysis and population studies. When data publication, however, it may disclose the personal privacy of some people, since it can be combined with external information. Therefore, a social network data holder has to remove the identifiers of persons and modify data which have the potential to disclose the privacy of the persons by combining it with external information. The utility of data is maximized when the modification of data is minimized. In this paper, we propose a privacy protection method for social network data that considers both structural and content information. Previous work did not consider content information in the social network or distorted too much structural information. We also verify the effectiveness and applicability of the proposed method under various experimental conditions.

Authentication Scheme using Biometrics in Intelligent Vehicle Network (지능형 자동차 내부 네트워크에서 생체인증을 이용한 인증기법)

  • Lee, Kwang-Jae;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.4 no.3
    • /
    • pp.15-20
    • /
    • 2013
  • Studies on the intelligent vehicles that are fused with IT and intelligent vehicle technologies are currently under active discussion. And many new service models for them are being developed. As intelligent vehicles are being actively developed, a variety of wireless services are support. As such intelligent vehicles use wireless network, they are exposed to the diverse sources of security risk. This paper aims to examine the factors to threaten intelligent vehicle, which are usually intruded through network system and propose the security solution using biometric authentication technique. The proposed security system employs biometric authentication technique model that can distinguish the physical characteristics of user.

제어시스템 ICCP 프로토콜 사이버 보안 현황

  • Kim, SungJin;Shon, Taeshik
    • Review of KIISC
    • /
    • v.24 no.5
    • /
    • pp.32-38
    • /
    • 2014
  • 전력시스템에 IT를 결합한 스마트그리드에 대한 연구가 최근 활발히 진행되고 있다. 스마트그리드 중 전력시스템의 핵심이라 할 수 있는 전력시스템 제어센터 간 통신을 담당하는 것이 ICCP 프로토콜이며, 주로 중앙급전소와 지역급전소간의 전력망 정보들을 교환하는데 사용되고 있다. 이 프로토콜은 단지 전력망의 정보교환 뿐 아니라 전력기기제어 기능도 가지고 있다. ICCP 프로토콜은 TCP/IP 프로토콜을 기반으로 동작하기 때문에 잠재적으로 다양한 형태의 사이버 공격이 가능하다. 또한 이 프로토콜을 사용하는 중앙급전소의 경우 주요 국가기반시설로써 사이버테러에 더욱더 공고한 대응체계를 갖추어야 할 필요가 있다. 현재 ICCP 프로토콜을 사용하는 통신 구간은 일반적으로 외부 네트워크와 분리되어 그 안전성을 담보하고 있지만, 네트워크 분리를 통한 보안성 향상 기법이 체계적인 관리와 함께 수반되지 않으면 인적 취약성이나 새로운 형태의 모바일 기기를 통한 물리적 취약성에 지속적으로 노출 될 수 있는 잠재적 위험을 내포하고 있다. 따라서 이러한 보안 사고의 잠재적 발생 가능성으로 인해 외부네트워크와 분리된 제어센터들도 향후 더욱더 높은 수준의 보안 기술을 적용할 필요성이 강조되고 있다. 본 논문에서는 전력 제어센터 사이에서 사용되고 있는 ICCP 프로토콜의 사이버 보안 현황에 대해 살펴보고 해당 프로토콜의 보안 위험성과 이에 대한 대응방안을 고찰한다.

A study with respect to the home networking security Technology based on SIP (SIP기반 홈네트워킹 보안 기술에 관한 연구)

  • Ham, Yoeng-Ock;Shin, Young-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.169-180
    • /
    • 2009
  • Generally home networks are based on wired network and wireless network. This makes customers be capable of using electric home appliances and full-duplex multimedia services and controlling the machines without any restrictions of place or time. Now that the scope of home security is being extended, the home networks can be formed with not only personal computer but also home automation, electric home appliances, and etc. But this causes many of attacks of invasion and damages. Therefore in this paper we suggest the SSIP(Secure Session Initiate protocol) model for solving those problems. The SSIP model is able to provide an efficient authentication and reduce the time of session re-establishment and set-up by adding ability of SIP authentication to Cluster-to-Cluster environment performed on home gateway.