• Title/Summary/Keyword: 차단벽

Search Result 153, Processing Time 0.04 seconds

Mechanism for Access Control to Clients in Intranet with Using ARP Spoofing (ARP Spoofing을 이용한 LAN 클라이언트 접속 제어 기법)

  • Lee, Geonwoo;Koo, Sangsoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.15-18
    • /
    • 2018
  • This paper proposes mechanism to build a economical access control system when a user's host requires block to an external network, such as computer class conducted at educational institutions. The proposed mechanism is to block clients from accessing the external network by using the one of MITM(Man In The Middle) technique, ARP Spoofing. It prevents packets from being forwarded to outside by gateway. So It can build system simply and economically because Client hosts are don't need to install firewall or any extra agent.

  • PDF

Solution of Noise Problem by Using Noise Prediction (소음예측을 이용한 전력용 변압기 소음문제의 해결책 제시)

  • Koo, Kyo-Sun;Kweon, Dong-Jin;Woo, Jung-Wook;Kwak, Joo-Sik;Kang, Yeon-Woog
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.85-86
    • /
    • 2007
  • 생활수준의 향상으로 변전소의 소음은 주민들에게 민감한 문제로 대두되고 있으며, 소음에 관한 민원이 끊임없이 발생하고 있는 실정이다. 이러한 변전소 소음문제를 해결하기 위해서는 변전소의 주소 음원인 변압기의 소음을 줄이는 방법과 변압기의 소음이 민가까지 전파되지 않도록 방음벽 등으로 적절히 차단하는 두 가지 방법이 있다. 본 논문에서는 변전소의 소음문제를 효과적으로 해결하기 위하여 변전소의 소음을 예측하고 그에 따른 적절한 해결책을 제시하였다.

  • PDF

Design of Honeynet with separated port managing Honeypot on VM (가상머신에서의 포트 분리 관리 허니팟과 허니넷 설계)

  • 임인빈;최재호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.643-645
    • /
    • 2004
  • 네트워크가 복잡해지면서 다양한 형태의 위험에 노출된다. 일반적인 보안 솔루션으로 사용하는 방화벽(Firewall)이나 침입탐지시스템(IDS)은 허가받지 않은 외부의 접속이나 알려진 공격만을 차단하는 단순하고 수동적인 시스템이다. 이에 반해 허니팟은 웹서버와 같은 실제 Front-End 시스템과 유사하거나, 밀접한 관련을 갖고 직접적으로 반응하므로 신뢰성 높은 실시간 정보를 얻을 수 있어서 관리자가 다양한 위협에 능동적이고 효과적으로 대응할 수 있다. 실제로 웜이나 DRDoS(Distributed Reflection DoS)등 수분만에 네트워크를 점유하는 자동화 공격과 함께 시스템 구성 취약점을 파고들거나 계정 획득을 통한 DB서버 등의 Back-End 시스템에 대한 수동 공격이 혼재한다. 따라서 시스템 전반적인 관리의 중요성이 강조되고 있다. 본 논문에서는 그간의 실험결과를 바탕으로 가상 머신으로 허니팟을 구성하고 특성별로 포트를 분리하여 관리하는 허니넷을 제안하고자 한다 이를 통해 1) 유연한 보안 시스템 구성이 가능하고 2) 관리 효율이 높아지며 3) 하드웨어 도입 비용 절감을 통해 시스템의 TCO(Totai Cost of Ownership)를 감소시키는 효과를 기대할 수 있다.

  • PDF

A Case Study on Construction of Container Terminal (2-6 Stage) in Busan New Port (부산항 신항 서컨테이너터미널(2-6단계) 축조공사 설계사례)

  • Kim, Yeong-Hak;Jeong, Uk-Jin;Yun, Gi-Seung;Hong, Jang-Ho
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.63-65
    • /
    • 2019
  • 부산항 신항 서컨테이너터미널은 선박 대형화와 완전 무인 자동화부두 구축이라는 설계컨셉에 따라 접안 가능한 최대선박은 3만 TEU 선박으로 결정하고 그에 따라 제반 시설들의 규격을 증대하였으며, 상부 자동화 설비들의 운영에 지장이 발생하지 않도록 대형 유수실, 월파차단벽 등의 침수 방지시설과 크레인 및 AGV구간 부등침하 방지를 위해 41.5m의 광폭케이슨과 176m의 광폭 DCM기초를 적용하고, 최신 설계기준에 의거한 내진 I 등급 구조물로 계획하는 등 안전하고 이용성이 뛰어난 컨테이너 터미널이 구축되도록 하였다.

  • PDF

Level Set based Topological Shape Optimization of Phononic Crystals (음향결정 구조의 레벨셋 기반 위상 및 형상 최적설계)

  • Kim, Min-Geun;Hashimoto, Hiroshi;Abe, Kazuhisa;Cho, Seonho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.25 no.6
    • /
    • pp.549-558
    • /
    • 2012
  • A topology optimization method for phononic crystals is developed for the design of sound barriers, using the level set approach. Given a frequency and an incident wave to the phononic crystals, an optimal shape of periodic inclusions is found by minimizing the norm of transmittance. In a sound field including scattering bodies, an acoustic wave can be refracted on the obstacle boundaries, which enables to control acoustic performance by taking the shape of inclusions as the design variables. In this research, we consider a layered structure which is composed of inclusions arranged periodically in horizontal direction while finite inclusions are distributed in vertical direction. Due to the periodicity of inclusions, a unit cell can be considered to analyze the wave propagation together with proper boundary conditions which are imposed on the left and right edges of the unit cell using the Bloch theorem. The boundary conditions for the lower and the upper boundaries of unit cell are described by impedance matrices, which represent the transmission of waves between the layered structure and the semi-infinite external media. A level set method is employed to describe the topology and the shape of inclusions. In the level set method, the initial domain is kept fixed and its boundary is represented by an implicit moving boundary embedded in the level set function, which facilitates to handle complicated topological shape changes. Through several numerical examples, the applicability of the proposed method is demonstrated.

Measurement and Analysis of P2P Traffic in Campus Networks Under Firewall (방화벽이 존재하는 캠퍼스 망에서의 P2P 트래픽 측정 및 분석)

  • Lee, Young-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11B
    • /
    • pp.750-757
    • /
    • 2005
  • This paper reports on the study of P2P traffic behaviors in a high-speed campus network under a simple firewall which drops packets with default port numbers for the well-blown P2P applications. Among several ways of detecting P2P traffic, the easiest method is to filter out packets with the default port number of each P2P application. After deploying the port-based firewall against P2P-traffic, it is expected that the amount of P2P traffic will be decreased. However, during the eight-month measurement period, three new commercial P2P applications have been identified and their traffic usages have reached up to $30/5.6\%$ of the total outbound/inbound traffic volumes at the end of the measurement period. In addition, the most famous P2P application, eDonkey, has adapted and has escaped detection through port hopping. The measurement result shows that the amount of eDonkey traffic is around $6.7/4.0\%$ of the total outbound/inbound traffic volume. From the measurement results, it is observed that the port-based firewall is not effective to limit the usage of P2P applications and that the P2P traffic is steadily growing due to not only the evolution of existing P2P applications such as port hopping but also appearances of new P2P applications.

Geophysical Investigation of the change of geological environment of the Nanjido Landfill due to the Stabilization Process (난지도 매립장의 안정화에 따른 지질환경 변화 조사를 위한 지구물리 탐사)

  • Lee, Kie-Hwa;Kwon, Byung-Doo;Rim, Hyoung-Rae;Yang, Jun-Mo
    • Journal of the Korean Geophysical Society
    • /
    • v.3 no.2
    • /
    • pp.113-126
    • /
    • 2000
  • We have conducted multiple geophysical surveys to investigate the geoenvironmental change of the Nanjido Landfill due to the stabilization process. Geophyscial surveys are comprized of gravity, magnetic, dipole-dipole electrical and SP methods. Due to the field conditions, surveys were conducted on the top surface of the landfill no.2 and southern border areas in front of landfills. The gravity anomalies obtained on the top surface of the landfill no.2 in 1999 show that the gradient of the anomaly on the central area is decreasing in comparison with that observed four years ago. The complexity of magnetic anomaly pattern it also decreasing. These facts suggest that the stabilization work of the Nanjido landfill makes some progress by compaction process due to repetitive subsidence and refilling. The dipole-dipole electrical resistivity and SP data obtained on the outside of the waterproof wall at the landfill no.1 were severely affected by unsatisfactory surface conditions. On the other hand, the dipole-dipole electrical resistivity profiles obtained on the inside and outside parts of the waterproof wall at the landfill no.2 show the blocking effect of leachate flow by the waterproof wall. Few SP anomalies are observed on the top and side surfaces of the landfill no.2, but SP anomalies obtained on the base area inside the waterproof wall strongly reflect the effect of leachate collecting wells.

  • PDF

A Study to Hierarchical Visualization of Firewall Access Control Policies (방화벽 접근정책의 계층적 가시화 방법에 대한 연구)

  • Kim, Tae-yong;Kwon, Tae-woong;Lee, Jun;Lee, Youn-su;Song, Jung-suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1087-1101
    • /
    • 2020
  • Various security devices are used to protect internal networks and valuable information from rapidly evolving cyber attacks. Firewall, which is the most commonly used security device, tries to prevent malicious attacks based on a text-based filtering rule (i.e., access control policy), by allowing or blocking access to communicate between inside and outside environments. However, in order to protect a valuable internal network from large networks, it has no choice but to increase the number of access control policy. Moreover, the text-based policy requires time-consuming and labor cost to analyze various types of vulnerabilities in firewall. To solve these problems, this paper proposes a 3D-based hierarchical visualization method, for intuitive analysis and management of access control policy. In particular, by providing a drill-down user interface through hierarchical architecture, Can support the access policy analysis for not only comprehensive understanding of large-scale networks, but also sophisticated investigation of anomalies. Finally, we implement the proposed system architecture's to verify the practicality and validity of the hierarchical visualization methodology, and then attempt to identify the applicability of firewall data analysis in the real-world network environment.

A Bloom Filter Application of Network Processor for High-Speed Filtering Buffer-Overflow Worm (버퍼 오버플로우 웜 고속 필터링을 위한 네트워크 프로세서의 Bloom Filter 활용)

  • Kim Ik-Kyun;Oh Jin-Tae;Jang Jong-Soo;Sohn Sung-Won;Han Ki-Jun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.93-103
    • /
    • 2006
  • Network solutions for protecting against worm attacks that complement partial end system patch deployment is a pressing problem. In the content-based worm filtering, the challenges focus on the detection accuracy and its performance enhancement problem. We present a worm filter architecture using the bloom filter for deployment at high-speed transit points on the Internet, including firewalls and gateways. Content-based packet filtering at multi-gigabit line rates, in general, is a challenging problem due to the signature explosion problem that curtails performance. We show that for worm malware, in particular, buffer overflow worms which comprise a large segment of recent outbreaks, scalable -- accurate, cut-through, and extensible -- filtering performance is feasible. We demonstrate the efficacy of the design by implementing it on an Intel IXP network processor platform with gigabit interfaces. We benchmark the worm filter network appliance on a suite of current/past worms, showing multi-gigabit line speed filtering prowess with minimal footprint on end-to-end network performance.

Design and Implementation of Anomaly Traffic Control framework based on Linux Netfilter System and CBQ Routing Mechanisms (리눅스 Netfilter시스템과 CBQ 라우팅 기능을 이용한 비정상 트래픽 제어 프레임워크 설계 및 구현)

  • 조은경;고광선;이태근;강용혁;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.129-140
    • /
    • 2003
  • Recently viruses and various hacking tools that threat hosts on a network becomes more intelligent and cleverer, and so the various security mechanisms against them have ken developed during last decades. To detect these network attacks, many NIPSs(Network-based Intrusion Prevention Systems) that are more functional than traditional NIDSs are developed by several companies and organizations. But, many previous NIPSS are hewn to have some weakness in protecting important hosts from network attacks because of its incorrectness and post-management aspects. The aspect of incorrectness means that many NIPSs incorrectly discriminate between normal and attack network traffic in real time. The aspect of post-management means that they generally respond to attacks after the intrusions are already performed to a large extent. Therefore, to detect network attacks in realtime and to increase the capability of analyzing packets, faster and more active responding capabilities are required for NIPS frameworks. In this paper, we propose a framework for real-time intrusion prevention. This framework consists of packet filtering component that works on netfilter in Linux kernel and traffic control component that have a capability of step-by-step control over abnormal network traffic with the CBQ mechanism.